CVE-2024-49767
ADVISORY - githubSummary
Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting.
The Request.max_content_length setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
NIST
CVSS SCORE
6.9mediumGitHub
3.9
CVSS SCORE
6.9mediumAlpine
-
Debian
-
CVSS SCORE
N/AlowUbuntu
3.9
CVSS SCORE
7.5mediumRed Hat
3.9
CVSS SCORE
5.3mediumChainguard
CGA-3m9h-7wmp-p5r3
-
Chainguard
CGA-4gfj-4gfq-284g
-
Chainguard
CGA-5qqw-78qf-xfwg
-
Chainguard
CGA-6vr6-fpjg-j7qg
-
Chainguard
CGA-c62x-7p7g-hqvm
-
Chainguard
CGA-cwvc-2mhw-gmxh
-
Chainguard
CGA-h8v7-4923-8jff
-
Chainguard
CGA-p5gp-26hq-j5rc
-
Chainguard
CGA-vv6r-6643-36qx
-
Chainguard
CGA-w73w-f2p5-rrxx
-
Photon
CVE-2024-49767
-
CVSS SCORE
7.5highminimos
MINI-2cxx-4gv7-x6xp
-
minimos
MINI-mjfp-jxq9-h4f3
-