Vulnerability identifier: #VU74378
Vulnerability risk: Low
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-400
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
wagtail
Web applications /
CMS
Vendor: Torchbox
Description
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote administrator can trigger resource exhaustion and perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
wagtail: 4.0 - 4.2.1
External links
http://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf
http://github.com/wagtail/wagtail/releases/tag/v4.2.2
http://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880
http://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9
http://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size
http://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165
http://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a
http://github.com/wagtail/wagtail/releases/tag/v4.1.4
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.