Miggo Logo

CVE-2024-34488:
Ryu Infinite Loop vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.71412%
Published
5/5/2024
Updated
7/3/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ryupip<= 4.34

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the OFPMultipartReply parser's handling of message body length. The code shown in GitHub issue #191 demonstrates a while loop that parses message parts using b.length for offset calculation. When an attacker provides b.length=0, the offset increment becomes zero, making the loop condition (offset < msg_len) never false. This matches the CWE-835 infinite loop pattern described in the advisory. The code location is explicitly referenced in both the CVE description and GitHub issue, with a clear PoC demonstrating the exploit mechanism.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

`O*PMultip*rtR*ply` in p*rs*r.py in **u**t S*N Ryu *.** *llows *tt**k*rs to **us* * **ni*l o* s*rvi** (in*init* loop) vi* `*.l*n*t*=*`.

Reasoning

T** vuln*r**ility st*ms *rom t** O*PMultip*rtR*ply p*rs*r's **n*lin* o* m*ss*** *o*y l*n*t*. T** *o** s*own in *it*u* issu* #*** **monstr*t*s * w*il* loop t**t p*rs*s m*ss*** p*rts usin* *.l*n*t* *or o**s*t **l*ul*tion. W**n *n *tt**k*r provi**s *.l*