CVE-2024-24762

EUVD-2024-0059
`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
fastapiexpertpython-multipart
𝑥
< 0.0.7
fastapiexpertpython-multipart
𝑥
< 0.0.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-multipart
bookworm
no-dsa
bullseye
no-dsa
forky
0.0.20-1
fixed
sid
0.0.20-1
fixed
trixie
0.0.20-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-multipart
bionic
dne
focal
dne
jammy
needs-triage
mantic
ignored
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage
trusty
dne
xenial
dne