NA

CVE-2024-24762

Published: 05/02/2024 Updated: 17/02/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

Vulnerable Product Search on Vulmon Subscribe to Product

tiangolo fastapi

Vendor Advisories

Debian Bug report logs - #1063538 python-multipart: CVE-2024-24762 Package: src:python-multipart; Maintainer for src:python-multipart is Sandro Tosi <morph@debianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 9 Feb 2024 14:06:11 UTC Severity: important Tags: security, upstream Found in version p ...