Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-24486

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.6

Описание

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using UPLOAD_KEEP_FILENAME=True in project configurations.

РелизСтатусПримечание
devel

needed

esm-apps/jammy

needed

esm-apps/noble

needed

jammy

needed

noble

needed

questing

needed

upstream

released

0.0.22

Показывать по

EPSS

Процентиль: 5%
0.0002
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
nvd
12 дней назад

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.

CVSS3: 8.6
debian
12 дней назад

Python-Multipart is a streaming multipart parser for Python. Prior to ...

suse-cvrf
11 дней назад

Security update for python-python-multipart

CVSS3: 8.6
github
12 дней назад

Python-Multipart has Arbitrary File Write via Non-Default Configuration

CVSS3: 8.6
fstec
14 дней назад

Уязвимость конфигурации UPLOAD_DIR и UPLOAD_KEEP_FILENAME=True потокового многокомпонентного парсера python-multipart, позволяющая нарушителю записывать произвольные файлы

EPSS

Процентиль: 5%
0.0002
Низкий

8.6 High

CVSS3