CVE-2024-24762

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Feb 5, 2024
Updated: Feb 17, 2024
CWE ID 1333
CWE ID 400

Summary

CVE-2024-24762 impacts the `python-multipart` library, which is used for streaming multipart parsing in Python. The vulnerability arises when processing form data, where `python-multipart` utilizes a Regular Expression to parse the `Content-Type` header. An attacker can exploit this by sending a custom `Content-Type` option that is challenging for the RegEx to process, resulting in excessive CPU usage and an indefinite stall. This causes the main event loop to become unresponsive, making the process incapable of handling further requests, thereby leading to a Regular Expression Denial of Service (ReDoS) attack. The vulnerability has been mitigated through a patch in version 0.0.7.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-24762 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions