Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. python-multipart
  4. ›
  5. GMS-2024-249

GMS-2024-249: python-multipart vulnerable to Content-Type Header ReDoS

February 12, 2024

When using form data, python-multipart uses a Regular Expression to parse the HTTP Content-Type header, including options. An attacker could send a custom-made Content-Type option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop.

References

  • github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4
  • github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p
  • github.com/advisories/GHSA-2jv5-9r88-3w3p
  • github.com/andrew-d/python-multipart/blob/d3d16dae4b061c34fe9d3c9081d9800c49fc1f7a/multipart/multipart.py

Code Behaviors & Features

Detect and mitigate GMS-2024-249 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.0.6

Fixed versions

  • 0.0.7

Solution

Upgrade to version 0.0.7 or above.

Source file

pypi/python-multipart/GMS-2024-249.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:11 +0000.