CVE-2024-24762
CVSS 3.1 Score 7.5 of 10 (high)
Details
Summary
CVE-2024-24762 impacts the `python-multipart` library, which is used for streaming multipart parsing in Python. The vulnerability arises when processing form data, where `python-multipart` utilizes a Regular Expression to parse the `Content-Type` header. An attacker can exploit this by sending a custom `Content-Type` option that is challenging for the RegEx to process, resulting in excessive CPU usage and an indefinite stall. This causes the main event loop to become unresponsive, making the process incapable of handling further requests, thereby leading to a Regular Expression Denial of Service (ReDoS) attack. The vulnerability has been mitigated through a patch in version 0.0.7.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.