7.5
CWE
400 770
Advisory Published
Advisory Published
Updated

CVE-2024-49767: Werkzeug possible resource exhaustion when parsing file data in forms

First published: Fri Oct 25 2024(Updated: )

Applications using Werkzeug to parse `multipart/form-data` requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the `Request.max_form_memory_size` setting. The `Request.max_content_length` setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
debian/python-werkzeug<=1.0.1+dfsg1-2+deb11u1<=2.2.2-3<=3.0.4-1
debian/quart<=0.14.1-1<=0.18.3-2<=0.19.6-1
pip/Quart<0.20.0
0.20.0
pip/werkzeug<=3.0.5
3.0.6
IBM Storage Defender Resiliency Service<=2.0.0 - 2.0.9
Quart<0.19.7
Werkzeug<3.0.6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2024-49767?

    CVE-2024-49767 is classified as a moderate severity vulnerability due to potential resource exhaustion.

  • How do I fix CVE-2024-49767?

    To address CVE-2024-49767, upgrade to Quart version 0.20.0 or Werkzeug version 3.0.6 or later.

  • What applications are affected by CVE-2024-49767?

    CVE-2024-49767 affects applications that use Werkzeug and Quart versions up to specific thresholds as noted in the affected software list.

  • Can CVE-2024-49767 impact my application's performance?

    Yes, exploited properly, CVE-2024-49767 can lead to significant performance degradation or denial of service due to resource exhaustion.

  • Is my deployment at risk with CVE-2024-49767?

    If you are using affected versions of Werkzeug or Quart, your deployment could be at risk for CVE-2024-49767 if proper mitigations are not in place.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203