First published: Fri Oct 25 2024(Updated: )
Applications using Werkzeug to parse `multipart/form-data` requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the `Request.max_form_memory_size` setting. The `Request.max_content_length` setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/quart | <=0.19.6 | 0.19.7 |
pip/werkzeug | <=3.0.5 | 3.0.6 |
<0.19.7 | ||
Palletsprojects Werkzeug | <3.0.6 | |
debian/python-werkzeug | <=1.0.1+dfsg1-2+deb11u1<=2.2.2-3<=3.0.4-1 | |
debian/quart | <=0.14.1-1<=0.18.3-2<=0.19.6-1 | |
Palletsprojects Quart Python | <0.19.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.