Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3107 | Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue. |
Github GHSA |
GHSA-q34m-jh98-gwm2 | Werkzeug possible resource exhaustion when parsing file data in forms |
Ubuntu USN |
USN-7093-1 | Werkzeug vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Feb 2025 11:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_ai:2.17::el8 |
Thu, 13 Feb 2025 09:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat openshift Ai |
|
| CPEs | cpe:/a:redhat:openshift_ai:2.16::el8 | |
| Vendors & Products |
Redhat
Redhat openshift Ai |
Fri, 03 Jan 2025 21:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 28 Dec 2024 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 Nov 2024 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Palletsprojects quart
|
|
| CPEs | cpe:2.3:a:palletsprojects:quart:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Palletsprojects quart
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 26 Oct 2024 10:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Sat, 26 Oct 2024 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Palletsprojects
Palletsprojects werkzeug |
|
| CPEs | cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Palletsprojects
Palletsprojects werkzeug |
|
| Metrics |
ssvc
|
Sat, 26 Oct 2024 04:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue. | |
| Title | Werkzeug possible resource exhaustion when parsing file data in forms | |
| Weaknesses | CWE-400 CWE-770 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-03T12:04:27.829Z
Reserved: 2024-10-18T13:43:23.457Z
Link: CVE-2024-49767
Updated: 2025-01-03T12:04:27.829Z
Status : Modified
Published: 2024-10-25T20:15:04.530
Modified: 2025-01-03T12:15:26.257
Link: CVE-2024-49767
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN