Skip to content

[HIGH] Security Vulnerability in python-multipart #1895

@ghost

Description

Security Vulnerability Detected

Dependency: python-multipart
Criticality: HIGH (Score: undefined)

Vulnerability Details

Name: CVE-2024-24762

Description:
python-multipart is a streaming multipart parser for Python. When using form data, python-multipart uses a Regular Expression to parse the HTTP Content-Type header, including options. An attacker could send a custom-made Content-Type option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

Metadata

"{\"vulnerabilityIdentifiers\":[\"CVE-2024-24762\"],\"published\":\"2024-02-05T15:15:09.260\",\"lastModified\":\"2025-05-05T14:14:26.363\",\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":3.6,\"weaknesses\":[\"CWE-400\",\"CWE-1333\"]}"

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions