Security Vulnerability Detected
Dependency: python-multipart
Criticality: HIGH (Score: undefined)
Vulnerability Details
Name: CVE-2024-24762
Description:
python-multipart is a streaming multipart parser for Python. When using form data, python-multipart uses a Regular Expression to parse the HTTP Content-Type header, including options. An attacker could send a custom-made Content-Type option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
Metadata
"{\"vulnerabilityIdentifiers\":[\"CVE-2024-24762\"],\"published\":\"2024-02-05T15:15:09.260\",\"lastModified\":\"2025-05-05T14:14:26.363\",\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":3.6,\"weaknesses\":[\"CWE-400\",\"CWE-1333\"]}"
Security Vulnerability Detected
Dependency:
python-multipartCriticality: HIGH (Score: undefined)
Vulnerability Details
Name: CVE-2024-24762
Description:
python-multipartis a streaming multipart parser for Python. When using form data,python-multipartuses a Regular Expression to parse the HTTPContent-Typeheader, including options. An attacker could send a custom-madeContent-Typeoption that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.Metadata
"{\"vulnerabilityIdentifiers\":[\"CVE-2024-24762\"],\"published\":\"2024-02-05T15:15:09.260\",\"lastModified\":\"2025-05-05T14:14:26.363\",\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":3.6,\"weaknesses\":[\"CWE-400\",\"CWE-1333\"]}"