
We found results for “”
CVE-2024-49767
Good to know:

Date: October 25, 2024
Werkzeug is a Web Server Gateway Interface web application library. Applications using "werkzeug.formparser.MultiPartParser" corresponding to a version of Werkzeug prior to 3.0.6 to parse "multipart/form-data" requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
Language: Python
Severity Score
Related Resources (10)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version LostTech.TensorBoard.Python.runtime.win-x64 - no_fix;werkzeug - 3.0.0;werkzeug - 3.0.4;werkzeug - 2.3.0;Werkzeug - 3.0.6;Quart - 0.19.7;quart - no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |