Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-24762

Опубликовано: 05 фев. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 7.5

Описание

python-multipart is a streaming multipart parser for Python. When using form data, python-multipart uses a Regular Expression to parse the HTTP Content-Type header, including options. An attacker could send a custom-made Content-Type option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

0.0.20-1
esm-apps/jammy

needed

esm-apps/noble

not-affected

0.0.9-1
esm-infra/focal

DNE

focal

DNE

jammy

needed

mantic

ignored

end of life, was needs-triage
noble

not-affected

0.0.9-1
oracular

ignored

end of life, was needs-triage

Показывать по

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 2 лет назад

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

CVSS3: 7.5
debian
около 2 лет назад

`python-multipart` is a streaming multipart parser for Python. When us ...

CVSS3: 7.5
github
почти 2 года назад

python-multipart vulnerable to Content-Type Header ReDoS

CVSS3: 7.5
fstec
около 2 лет назад

Уязвимость потокового многокомпонентного парсера python-multipart, связанная с неэффективной сложностью регулярных выражений, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
около 1 года назад

Уязвимость python3-multipart

7.5 High

CVSS3