Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-24762

Опубликовано: 05 фев. 2024
Источник: debian
EPSS Низкий

Описание

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-multipartfixed0.0.9-1package
python-multipartno-dsabookwormpackage
python-multipartno-dsabullseyepackage

Примечания

  • Original report at fastapi: https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389

  • But the fix is within python-multipart:

  • https://github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4 (0.0.7)

  • https://github.com/Kludex/python-multipart/pull/75

EPSS

Процентиль: 82%
0.01802
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

CVSS3: 7.5
nvd
больше 1 года назад

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

CVSS3: 7.5
redos
7 месяцев назад

Уязвимость python3-multipart

CVSS3: 7.5
github
больше 1 года назад

python-multipart vulnerable to Content-Type Header ReDoS

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость потокового многокомпонентного парсера python-multipart, связанная с неэффективной сложностью регулярных выражений, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 82%
0.01802
Низкий