7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.005 Low
EPSS
Percentile
77.3%
Multipart form parsing can consume large amounts of CPU and memory when
processing form inputs containing very large numbers of parts. This stems
from several causes: 1. mime/multipart.Reader.ReadForm limits the total
memory a parsed multipart form can consume. ReadForm can undercount the
amount of memory consumed, leading it to accept larger inputs than
intended. 2. Limiting total memory does not account for increased pressure
on the garbage collector from large numbers of small allocations in forms
with many parts. 3. ReadForm can allocate a large number of short-lived
buffers, further increasing pressure on the garbage collector. The
combination of these factors can permit an attacker to cause an program
that parses multipart forms to consume large amounts of CPU and memory,
potentially resulting in a denial of service. This affects programs that
use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http
package with the Request methods FormFile, FormValue, ParseMultipartForm,
and PostFormValue. With fix, ReadForm now does a better job of estimating
the memory consumption of parsed forms, and performs many fewer short-lived
allocations. In addition, the fixed mime/multipart.Reader imposes the
following limits on the size of parsed forms: 1. Forms parsed with ReadForm
may contain no more than 1000 parts. This limit may be adjusted with the
environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with
NextPart and NextRawPart may contain no more than 10,000 header fields. In
addition, forms parsed with ReadForm may contain no more than 10,000 header
fields across all parts. This limit may be adjusted with the environment
variable GODEBUG=multipartmaxheaders=.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | golang-1.10 | <ย any | UNKNOWN |
ubuntu | 14.04 | noarch | golang-1.10 | <ย any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-1.10 | <ย any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-1.13 | <ย any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.13 | <ย any | UNKNOWN |
ubuntu | 22.04 | noarch | golang-1.13 | <ย any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-1.13 | <ย any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.14 | <ย any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-1.16 | <ย any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.16 | <ย any | UNKNOWN |
github.com/golang/go/commit/7917b5f31204528ea72e0629f0b7d52b35b27538 (go.1.19.8)
github.com/golang/go/commit/bf8c7c575c8a552d9d79deb29e80854dc88528d0 (go1.20.3)
go.dev/issue/59153
groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
launchpad.net/bugs/cve/CVE-2023-24536
nvd.nist.gov/vuln/detail/CVE-2023-24536
security-tracker.debian.org/tracker/CVE-2023-24536
www.cve.org/CVERecord?id=CVE-2023-24536