Lucene search

K
githubGitHub Advisory DatabaseGHSA-2HRW-HX67-34X6
HistoryFeb 15, 2023 - 3:30 a.m.

Resource exhaustion in Django

2023-02-1503:30:47
CWE-400
GitHub Advisory Database
github.com
37
django
multipart request parser
resource exhaustion
denial-of-service
software

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

60.8%

An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.

Affected configurations

Vulners
Node
django_projectdjangoRange<4.0.10
OR
django_projectdjangoRange<4.1.7
OR
django_projectdjangoRange<3.2.18
CPENameOperatorVersion
djangolt4.0.10
djangolt4.1.7
djangolt3.2.18

References

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

60.8%