DirectorySecurity Advisories
Sign In
Security Advisories

CGA-p5gp-26hq-j5rc

Published

Last updated

https://images.chainguard.dev/security/CGA-p5gp-26hq-j5rc
Package

emissary

Latest Update
Fixed
Fixed Version

3.9.1-r4

Aliases
  • CVE-2024-49767
  • GHSA-q34m-jh98-gwm2

Severity

7.5

High

CVSS V3

Summary

Werkzeug possible resource exhaustion when parsing file data in forms

Description

Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting.

The Request.max_content_length setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images