CVE-2024-53981

python-multipart has a Denial of service (DoS) via deformation `multipart/form-data` boundary

Description

python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.38%
Affected: Kludex python-multipart
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-53981?
CVE-2024-53981 has been scored as a high severity vulnerability.
How to fix CVE-2024-53981?
To fix CVE-2024-53981, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-53981 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-53981 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-53981?
CVE-2024-53981 affects Kludex python-multipart.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.