Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-24762

Опубликовано: 05 фев. 2024
Источник: debian
EPSS Низкий

Описание

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-multipartfixed0.0.9-1package
python-multipartno-dsabookwormpackage
python-multipartno-dsabullseyepackage

Примечания

  • Original report at fastapi: https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389

  • But the fix is within python-multipart:

  • https://github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4 (0.0.7)

  • https://github.com/Kludex/python-multipart/pull/75

EPSS

Процентиль: 85%
0.02486
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 лет назад

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

CVSS3: 7.5
nvd
около 2 лет назад

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

CVSS3: 7.5
github
почти 2 года назад

python-multipart vulnerable to Content-Type Header ReDoS

CVSS3: 7.5
fstec
около 2 лет назад

Уязвимость потокового многокомпонентного парсера python-multipart, связанная с неэффективной сложностью регулярных выражений, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
около 1 года назад

Уязвимость python3-multipart

EPSS

Процентиль: 85%
0.02486
Низкий