7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
48.3%
Werkzeug is a comprehensive WSGI web application library. Prior to version
2.2.3, Werkzeug’s multipart form data parser will parse an unlimited number
of parts, including file parts. Parts can be a small amount of bytes, but
each requires CPU time to parse and may use more memory as Python data. If
a request can be made to an endpoint that accesses request.data
,
request.form
, request.files
, or
request.get_data(parse_form_data=False)
, it can cause unexpectedly high
resource usage. This allows an attacker to cause a denial of service by
sending crafted multipart data to an endpoint that will parse it. The
amount of CPU time required can block worker processes from handling
legitimate requests. The amount of RAM required can trigger an out of
memory kill of the process. Unlimited file parts can use up memory and file
handles. If many concurrent requests are sent continuously, this can
exhaust or kill all available workers. Version 2.2.3 contains a patch for
this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python-werkzeug | < 0.14.1+dfsg1-1ubuntu0.2 | UNKNOWN |
ubuntu | 20.04 | noarch | python-werkzeug | < 0.16.1+dfsg1-2ubuntu0.1 | UNKNOWN |
ubuntu | 22.04 | noarch | python-werkzeug | < 2.0.2+dfsg1-1ubuntu0.22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | python-werkzeug | < 2.0.2+dfsg1-3ubuntu0.22.10.1 | UNKNOWN |
ubuntu | 23.04 | noarch | python-werkzeug | < 2.2.2-2ubuntu0.1 | UNKNOWN |
ubuntu | 16.04 | noarch | python-werkzeug | < 0.10.4+dfsg1-1ubuntu1.2+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
github.com/pallets/werkzeug/commit/517cac5a804e8c4dc4ed038bb20dacd038e7a9f1
github.com/pallets/werkzeug/releases/tag/2.2.3
github.com/pallets/werkzeug/security/advisories/GHSA-xg9f-g7g7-2323
launchpad.net/bugs/cve/CVE-2023-25577
nvd.nist.gov/vuln/detail/CVE-2023-25577
security-tracker.debian.org/tracker/CVE-2023-25577
ubuntu.com/security/notices/USN-5948-1
ubuntu.com/security/notices/USN-5948-2
www.cve.org/CVERecord?id=CVE-2023-25577
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
48.3%