GMS-2024-249: python-multipart vulnerable to Content-Type Header ReDoS
When using form data, python-multipart
uses a Regular Expression to parse the HTTP Content-Type
header, including options. An attacker could send a custom-made Content-Type
option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop.
References
- github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4
- github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p
- github.com/advisories/GHSA-2jv5-9r88-3w3p
- github.com/andrew-d/python-multipart/blob/d3d16dae4b061c34fe9d3c9081d9800c49fc1f7a/multipart/multipart.py
Detect and mitigate GMS-2024-249 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →