Miggo Logo

CVE-2023-24536: Multipart form parsing can consume large amounts of CPU and memory when processing form inputs...

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.20736%
Published
4/6/2023
Updated
2/12/2025
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerable functions were identified directly from the vulnerability description and the description of the fix. The core issue lies in mime/multipart.Reader.ReadForm and its handling of memory and allocations. Several methods in the net/http package that use this multipart parser are also affected. The fix involved modifying ReadForm and imposing limits on the number of parts and headers, which also affected NextPart and NextRawPart. Since commit details were not available, the analysis relies on the textual description of the vulnerability and its remediation. The file paths are standard locations for these Go package functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Multip*rt *orm p*rsin* **n *onsum* l*r** *mounts o* *PU *n* m*mory w**n pro**ssin* *orm inputs *ont*inin* v*ry l*r** num**rs o* p*rts. T*is st*ms *rom s*v*r*l **us*s: *. mim*/multip*rt.R****r.R****orm limits t** tot*l m*mory * p*rs** multip*rt *orm *

Reasoning

T** vuln*r**l* *un*tions w*r* i**nti*i** *ir**tly *rom t** vuln*r**ility **s*ription *n* t** **s*ription o* t** *ix. T** *or* issu* li*s in `mim*/multip*rt.R****r.R****orm` *n* its **n*lin* o* m*mory *n* *llo**tions. S*v*r*l m*t*o*s in t** `n*t/*ttp`