Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-46136

Опубликовано: 25 окт. 2023
Источник: debian
EPSS Низкий

Описание

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-werkzeugfixed3.0.1-1experimentalpackage
python-werkzeugfixed3.0.1-2package
python-werkzeugfixed2.2.2-3+deb12u1bookwormpackage
python-werkzeugnot-affectedbullseyepackage
python-werkzeugnot-affectedbusterpackage

Примечания

  • https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw

  • Introduced by: https://github.com/pallets/werkzeug/commit/cbb446fdcada7685fce936ded01b76c08dbd6eb5 (2.0.0rc1)

  • https://github.com/pallets/werkzeug/commit/b1916c0c083e0be1c9d887ee2f3d696922bfc5c1 (3.0.1)

EPSS

Процентиль: 60%
0.0041
Низкий

Связанные уязвимости

CVSS3: 8
ubuntu
больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 7.5
redhat
больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 8
nvd
больше 1 года назад

Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.

CVSS3: 7.5
msrc
больше 1 года назад

Описание отсутствует

suse-cvrf
больше 1 года назад

Security update for python-Werkzeug

EPSS

Процентиль: 60%
0.0041
Низкий