Vulnerability CVE-2024-24762: Information

Description

`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: Feb. 5, 2024
Modified: Feb. 17, 2024
Error type identifier: CWE-1333

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
python3-module-fastapisisyphus0.109.2-alt10.110.3-alt1ALT-PU-2024-2022-2340153Fixed
python3-module-fastapisisyphus_e2k0.109.2-alt10.110.3-alt1ALT-PU-2024-2377-1-Fixed
python3-module-fastapisisyphus_riscv640.110.0-alt10.110.3-alt1ALT-PU-2024-3873-1-Fixed
python3-module-fastapisisyphus_loongarch640.109.2-alt10.110.3-alt1ALT-PU-2024-2091-1-Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:tiangolo:fastapi:*:*:*:*:*:*:*:*
      End excliding
      0.109.1