Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-24486

Опубликовано: 27 янв. 2026
Источник: debian
EPSS Низкий

Описание

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-multipartfixed0.0.20-1.1package
python-multipartfixed0.0.20-1.1~deb13u1trixiepackage
python-multipartno-dsabookwormpackage
python-multipartpostponedbullseyepackage

Примечания

  • https://github.com/Kludex/python-multipart/security/advisories/GHSA-wp53-j4wj-2cfg

  • Fixed by: https://github.com/Kludex/python-multipart/commit/9433f4bbc9652bdde82bbe380984e32f8cfc89c4 (0.0.22)

  • Followup for test: https://github.com/Kludex/python-multipart/commit/0fb59a9df0f273bfde99740b302ccb2ae45e2b8a (0.0.22)

EPSS

Процентиль: 8%
0.00029
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
2 месяца назад

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.

CVSS3: 8.6
redhat
2 месяца назад

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.

CVSS3: 8.6
nvd
2 месяца назад

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.

suse-cvrf
около 2 месяцев назад

Security update for python-python-multipart

suse-cvrf
2 месяца назад

Security update for python-python-multipart

EPSS

Процентиль: 8%
0.00029
Низкий