-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| django | pip | >= 4.2, < 4.2.10 | 4.2.10 |
| django | pip | >= 5.0, < 5.0.2 | 5.0.2 |
| Django | pip | >= 3.2, < 3.2.24 | 3.2.24 |
The vulnerability stems from the pre-patch implementation of intcomma shown in the commit diff. The recursive regex substitution pattern 'r"^(-?\d+)(\d{3})"' with repeated calls to intcomma() created quadratic time complexity for long inputs. The patched version replaced this with a non-recursive approach using string reversal and single-pass substitution, confirming the original function's vulnerability to resource exhaustion attacks.
A Semantic Attack on Google Gemini - Read the Latest Research