CVE-2024-49767
ADVISORY - githubSummary
Applications using Werkzeug to parse multipart/form-data
requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size
setting.
The Request.max_content_length
setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
EPSS Score: 0.01275 (0.786)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - github
Uncontrolled Resource Consumption
ADVISORY - gitlab
ADVISORY - redhat
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in