CVE-2024-53981

NameCVE-2024-53981
Descriptionpython-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1088991

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-multipart (PTS)bullseye0.0.5-2vulnerable
bookworm0.0.5-3vulnerable
sid, trixie0.0.17-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-multipartsource(unstable)(unfixed)1088991

Notes

[bookworm] - python-multipart <no-dsa> (Minor issue)
https://github.com/Kludex/python-multipart/security/advisories/GHSA-59g5-xgcq-4qw3
Fixed by: https://github.com/Kludex/python-multipart/commit/9205a0ec8c646b9f705430a6bfb52bd957b76c19 (0.0.18)
Fixed by: https://github.com/Kludex/python-multipart/commit/c4fe4d3cebc08c660e57dd709af1ffa7059b3177 (0.0.19)

Search for package or bug name: Reporting problems