Skip to main content
Version: latest

CVE-2024-49767

CVE Details

Visit the official vulnerability details page for CVE-2024-49767 to learn more.

Initial Publication

11/13/2024

Last Update

12/16/2024

Third Party Dependency

Werkzeug

NIST CVE Summary

Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.

CVE Severity

7.5

Our Official Summary

A flaw was found in the Werkzueg web application library. Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting and trigger a denial of service.

This vulnerability is reported on a few third party images which do not use this library or process data and hence the risk of occurence is very low. Impact of exploitation is also low because attack surface is limited to the container. Once the fix becomes available, we will adopt the fixed images.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.15✅ No Impact⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.11✅ No Impact⚠️ Impacted✅ No Impact✅ No Impact
4.5.10✅ No Impact⚠️ Impacted⚠️ Impacted⚠️ Impacted
4.5.8✅ No Impact⚠️ Impacted✅ No Impact✅ No Impact
4.5.5✅ No Impact⚠️ Impacted✅ No Impact✅ No Impact
4.4.20✅ No Impact⚠️ Impacted⚠️ Impacted⚠️ Impacted

Revision History

DateRevision
12/16/2024Impacted versions changed from 4.4.20, 4.5.10 to 4.4.20, 4.5.10, 4.5.15
12/11/2024Official summary revised: A flaw was found in the Werkzueg web application library. Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting and trigger a denial of service.This vulnerability is reported on a few third party images which do not use this library or process data and hence the risk of occurence is very low. Impact of exploitation is also low because attack surface is limited to the container. Once the fix becomes available, we will adopt the fixed images.
11/20/2024Impacted versions changed from 4.4.20 to 4.4.20, 4.5.10