Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01039}

epss

{'score': 0.00849}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01275}

epss

{'score': 0.01039}


Fri, 14 Feb 2025 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift_ai:2.17::el8

Thu, 13 Feb 2025 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat openshift Ai
CPEs cpe:/a:redhat:openshift_ai:2.16::el8
Vendors & Products Redhat
Redhat openshift Ai

Fri, 03 Jan 2025 12:45:00 +0000

Type Values Removed Values Added
References

Fri, 27 Dec 2024 21:15:00 +0000


Tue, 05 Nov 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Palletsprojects quart
CPEs cpe:2.3:a:palletsprojects:quart:*:*:*:*:*:python:*:*
Vendors & Products Palletsprojects quart
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Sat, 26 Oct 2024 01:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


Fri, 25 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Palletsprojects
Palletsprojects werkzeug
CPEs cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*
Vendors & Products Palletsprojects
Palletsprojects werkzeug
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 19:45:00 +0000

Type Values Removed Values Added
Description Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
Title Werkzeug possible resource exhaustion when parsing file data in forms
Weaknesses CWE-400
CWE-770
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-03T12:04:27.829Z

Reserved: 2024-10-18T13:43:23.457Z

Link: CVE-2024-49767

cve-icon Vulnrichment

Updated: 2025-01-03T12:04:27.829Z

cve-icon NVD

Status : Modified

Published: 2024-10-25T20:15:04.530

Modified: 2025-01-03T12:15:26.257

Link: CVE-2024-49767

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-25T19:41:35Z

Links: CVE-2024-49767 - Bugzilla

cve-icon OpenCVE Enrichment

No data.