You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /tmp/ws-ua_20241228110457_ULHPDM/python_NEGBEK/202412281105541/env/lib/python3.8/site-packages/python_multipart-0.0.16.dist-info,/tmp/ws-ua_20241228110457_ULHPDM/python_NEGBEK/202412281105541/env/lib/python3.8/site-packages/python_multipart-0.0.16.dist-info
python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18.
mend-for-github-combot
changed the title
CVE-2024-53981 (High) detected in python_multipart-0.0.16-py3-none-any.whl
CVE-2024-53981 (High) detected in python_multipart-0.0.16-py3-none-any.whl - autoclosed
Dec 28, 2024
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2024-53981 - High Severity Vulnerability
Vulnerable Library - python_multipart-0.0.16-py3-none-any.whl
A streaming multipart parser for Python
Library home page: https://files.pythonhosted.org/packages/ff/ec/e85b99fda29a3e7643ee39419fdd478782dbcd61c11d846a9a8fc748fff2/python_multipart-0.0.16-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20241228110457_ULHPDM/python_NEGBEK/202412281105541/env/lib/python3.8/site-packages/python_multipart-0.0.16.dist-info,/tmp/ws-ua_20241228110457_ULHPDM/python_NEGBEK/202412281105541/env/lib/python3.8/site-packages/python_multipart-0.0.16.dist-info
Dependency Hierarchy:
Found in HEAD commit: fda2a37b98507f17a864087fe28ef6b2dcf1984c
Found in base branch: 3.0
Vulnerability Details
python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18.
Publish Date: 2024-12-02
URL: CVE-2024-53981
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2024-12-02
Fix Resolution: 0.0.19
The text was updated successfully, but these errors were encountered: