5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): LOW
Activity log
- Created suggestion
Python-Multipart affected by Denial of Service via large multipart preamble or epilogue data
Python-Multipart is a streaming multipart parser for Python. Versions prior to 0.0.26 have a denial of service vulnerability when parsing crafted `multipart/form-data` requests with large preamble or epilogue sections. Upgrade to version 0.0.26 or later, which skips ahead to the next boundary candidate when processing leading CR/LF data and immediately discards epilogue data after the closing boundary.
References
-
https://github.com/Kludex/python-multipart/releases/tag/0.0.26 x_refsource_MISC
Affected products
- ==< 0.0.26
Matching in nixpkgs
pkgs.python312Packages.python-multipart
Streaming multipart parser for Python
pkgs.python313Packages.python-multipart
Streaming multipart parser for Python
pkgs.python314Packages.python-multipart
Streaming multipart parser for Python
Package maintainers
-
@risicle Robert Scott <code@humanleg.org.uk>