
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-15225 affects django-filter versions prior to 2.4.0. The vulnerability was discovered in automatically generated NumberFilter instances, where values later converted to integers were susceptible to potential DoS attacks through maliciously crafted input using exponential format with large exponents. The issue was disclosed and patched in September 2020 (GitHub Advisory).
The vulnerability exists in the NumberFilter component of django-filter, where input values using exponential format could be manipulated to cause excessive resource consumption during integer conversion. The issue has been assigned a CVSS v3.1 base score of 7.5 HIGH (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) by GitHub, and 6.5 MEDIUM by NIST (NVD). The vulnerability is classified as CWE-681 (Incorrect Conversion between Numeric Types).
Successful exploitation of this vulnerability could lead to Denial of Service (DoS) by consuming excessive system resources during the conversion of maliciously crafted numerical inputs (NetApp Advisory).
The vulnerability was patched in version 2.4.0 by implementing a MaxValueValidator with a default limitvalue of 1e50 to the form field used by NumberFilter instances. The update also introduced a new getmax_validator() method allowing customization of the validator limit or disabling it entirely. Users unable to upgrade can manually apply an equivalent validator as a workaround (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."