/
DirectorySecurity Advisories
Sign In
Security Advisories

CVE-2024-24762

Published

Last updated

NVD

https://nvd.nist.gov/vuln/detail/CVE-2024-24762

CGA ID

CGA-vg7g-jjc2-3r6j

Severity

Unknown

Description

python-multipart is a streaming multipart parser for Python. When using form data, python-multipart uses a Regular Expression to parse the HTTP Content-Type header, including options. An attacker could send a custom-made Content-Type option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

References

Affected packages


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs