2024-12-08 03:06:42 +00:00

64 lines
3.2 KiB
JSON

{
"id": "CVE-2024-53981",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T16:15:14.457",
"lastModified": "2024-12-02T16:15:14.457",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \\r or LF \\n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18."
},
{
"lang": "es",
"value": "python-multipart es un analizador multiparte de transmisi\u00f3n para Python. Al analizar datos de formularios, python-multipart omite los saltos de l\u00ednea (CR \\r o LF \\n) delante del primer l\u00edmite y cualquier byte posterior despu\u00e9s del \u00faltimo l\u00edmite. Esto sucede un byte a la vez y emite un evento de registro cada vez, lo que puede causar un registro excesivo para ciertas entradas. Un atacante podr\u00eda abusar de esto enviando una solicitud maliciosa con una gran cantidad de datos antes del primer o despu\u00e9s del \u00faltimo l\u00edmite, lo que causa una alta carga de CPU y detiene el hilo de procesamiento durante una cantidad significativa de tiempo. En el caso de la aplicaci\u00f3n ASGI, esto podr\u00eda detener el bucle de eventos y evitar que se procesen otras solicitudes, lo que resulta en una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se corrigi\u00f3 en 0.0.18."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/Kludex/python-multipart/commit/c4fe4d3cebc08c660e57dd709af1ffa7059b3177",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Kludex/python-multipart/security/advisories/GHSA-59g5-xgcq-4qw3",
"source": "security-advisories@github.com"
}
]
}