Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-46136

Опубликовано: 25 окт. 2023
Источник: debian

Описание

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-werkzeugfixed3.0.1-1experimentalpackage
python-werkzeugfixed3.0.1-2package
python-werkzeugfixed2.2.2-3+deb12u1bookwormpackage
python-werkzeugnot-affectedbullseyepackage
python-werkzeugnot-affectedbusterpackage

Примечания

  • https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw

  • Introduced by: https://github.com/pallets/werkzeug/commit/cbb446fdcada7685fce936ded01b76c08dbd6eb5 (2.0.0rc1)

  • https://github.com/pallets/werkzeug/commit/b1916c0c083e0be1c9d887ee2f3d696922bfc5c1 (3.0.1)

Связанные уязвимости

CVSS3: 8
ubuntu
больше 2 лет назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 7.5
redhat
больше 2 лет назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 8
nvd
больше 2 лет назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 7.5
msrc
больше 2 лет назад

Описание отсутствует

suse-cvrf
больше 2 лет назад

Security update for python-Werkzeug