Miggo Logo

CVE-2024-24762:
python-multipart vulnerable to Content-Type Header ReDoS

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.81977%
Published
2/12/2024
Updated
9/24/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
python-multipartpip<= 0.0.60.0.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the OPTION_RE regex pattern used in parse_options_header to parse header parameters. The attack payload demonstrates how a malformed Content-Type option with numerous backslashes triggers exponential regex processing time. The patched commit explicitly replaces this regex-based parsing with email.message.Message from the standard library, confirming this was the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry W**n usin* *orm **t*, `pyt*on-multip*rt` us*s * R**ul*r *xpr*ssion to p*rs* t** *TTP `*ont*nt-Typ*` *****r, in*lu*in* options. *n *tt**k*r *oul* s*n* * *ustom-m*** `*ont*nt-Typ*` option t**t is v*ry *i**i*ult *or t** R***x to pro**ss, *

Reasoning

T** vuln*r**ility st*ms *rom t** OPTION_R* r***x p*tt*rn us** in p*rs*_options_*****r to p*rs* *****r p*r*m*t*rs. T** *tt**k p*ylo** **monstr*t*s *ow * m*l*orm** *ont*nt-Typ* option wit* num*rous ***ksl*s**s tri***rs *xpon*nti*l r***x pro**ssin* tim*