0
0
mirror of https://github.com/wagtail/wagtail.git synced 2024-11-24 19:17:48 +01:00
wagtail/docs/releases/6.1.3.md
2024-07-11 11:43:18 +02:00

1.4 KiB

Wagtail 6.1.3 release notes

July 11, 2024

---
local:
depth: 1
---

What's new

CVE-2024-39317: Regular expression denial-of-service via search query parsing

This release addresses a denial-of-service vulnerability in Wagtail. A bug in Wagtail's parse_query_string would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, parse_query_string would take an unexpectedly large amount of time to process, resulting in a denial of service.

In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses parse_query_string, it may be exploitable by other users (e.g. unauthenticated users).

Many thanks to Jake Howard for reporting and fixing this issue. For further details, please see the CVE-2024-39317 security advisory.

Bug fixes

  • Allow renditions of .ico images (Julie Rymer)
  • Handle choice groups as dictionaries in active filters (Sébastien Corbin)
  • Fix image preview when Willow optimizers are enabled (Alex Tomkins)
  • Fix dynamic image serve view with certain backends (Sébastien Corbin)