Lucene search

K
nvd[email protected]NVD:CVE-2024-24762
HistoryFeb 05, 2024 - 3:15 p.m.

CVE-2024-24762

2024-02-0515:15:09
CWE-1333
CWE-400
web.nvd.nist.gov
4
python-multipart
content-type
regular expression
http
denial of service
cve-2024-24762

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

47.2%

python-multipart is a streaming multipart parser for Python. When using form data, python-multipart uses a Regular Expression to parse the HTTP Content-Type header, including options. An attacker could send a custom-made Content-Type option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can’t handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

Affected configurations

Nvd
Node
tiangolofastapiRange<0.109.1
VendorProductVersionCPE
tiangolofastapi*cpe:2.3:a:tiangolo:fastapi:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

47.2%