CVE-2024-49767

Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:palletsprojects:quart:*:*:*:*:*:python:*:*
cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*

History

03 Jan 2025, 12:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250103-0007/ -

27 Dec 2024, 21:15

Type Values Removed Values Added
References
  • () https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f -

Information

Published : 2024-10-25 20:15

Updated : 2025-01-03 12:15


NVD link : CVE-2024-49767

Mitre link : CVE-2024-49767

CVE.ORG link : CVE-2024-49767


JSON object : View

Products Affected

palletsprojects

  • quart
  • werkzeug
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling