Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files
Vulnerability Description
Wagtail is an open source content management system built on Django. Prior to versions 4.1.4 and 4.2.2, a memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash of denial of service. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. Image uploads are restricted to 10MB by default, however this validation only happens on the frontend and on the backend after the vulnerable code. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2). Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Wagtail 跨站脚本漏洞
Vulnerability Description
Torchbox Wagtail是英国Torchbox公司的一套开源的内容管理系统(CMS)。 Wagtail 1.5到4.1.4、4.2、4.2.1版本存在跨站脚本漏洞,该漏洞源于Wagtail在处理上传的图片和文档时存在内存耗尽问题,从而导致拒绝服务崩溃。
CVSS Information
N/A
Vulnerability Type
N/A