First published: Fri Oct 25 2024(Updated: )
Applications using Werkzeug to parse `multipart/form-data` requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the `Request.max_form_memory_size` setting. The `Request.max_content_length` setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-werkzeug | <=1.0.1+dfsg1-2+deb11u1<=2.2.2-3<=3.0.4-1 | |
debian/quart | <=0.14.1-1<=0.18.3-2<=0.19.6-1 | |
pip/Quart | <0.20.0 | 0.20.0 |
pip/werkzeug | <=3.0.5 | 3.0.6 |
IBM Storage Defender Resiliency Service | <=2.0.0 - 2.0.9 | |
Quart | <0.19.7 | |
Werkzeug | <3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49767 is classified as a moderate severity vulnerability due to potential resource exhaustion.
To address CVE-2024-49767, upgrade to Quart version 0.20.0 or Werkzeug version 3.0.6 or later.
CVE-2024-49767 affects applications that use Werkzeug and Quart versions up to specific thresholds as noted in the affected software list.
Yes, exploited properly, CVE-2024-49767 can lead to significant performance degradation or denial of service due to resource exhaustion.
If you are using affected versions of Werkzeug or Quart, your deployment could be at risk for CVE-2024-49767 if proper mitigations are not in place.