DirectorySecurity Advisories
Sign In
Security Advisories

CGA-6m66-cwf6-w8gq

Published

Last updated

https://images.chainguard.dev/security/CGA-6m66-cwf6-w8gq
Package

reflex

Latest Update
Fixed
Fixed Version

0.6.7-r0

Aliases
  • CVE-2024-53981
  • GHSA-59g5-xgcq-4qw3

Severity

7.5

High

CVSS V3

Summary

Denial of service (DoS) via deformation multipart/form-data boundary

Description

Summary

When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs.

An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS).

Impact

Applications that use python-multipart to parse form data (or use frameworks that do so) are affected.

Original Report

This security issue was reported by:

  • GitHub security advisory in Starlette on October 30 by @Startr4ck
  • Email to python-multipart maintainer on October 3 by @mnqazi

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images