CVE-2024-24762: CWE-400 Uncontrolled Resource Consumption in Kludex python-multipart
`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
AI Analysis
Technical Summary
CVE-2024-24762 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Kludex python-multipart library, a streaming multipart parser for Python. The vulnerability arises from the way python-multipart parses the HTTP Content-Type header when handling form data. Specifically, it uses a Regular Expression (RegEx) to parse the Content-Type header and its options. An attacker can craft a malicious Content-Type header with options designed to cause catastrophic backtracking or excessive processing time in the RegEx engine. This results in significant CPU resource consumption and stalls the main event loop of the affected process for minutes or longer. Because the main event loop is blocked, the process cannot handle additional incoming requests, effectively causing a Denial of Service (DoS) condition. The vulnerability affects version 0 of python-multipart and was patched in version 0.0.7. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on availability. There is no impact on confidentiality or integrity. No known exploits are currently reported in the wild. The vulnerability is particularly relevant for Python applications that rely on python-multipart to parse multipart form data, especially in web servers or APIs that handle file uploads or form submissions. Since the vulnerability blocks the main event loop, it is especially critical for asynchronous Python frameworks (e.g., FastAPI, Starlette) that depend on event loops for concurrency and responsiveness. Without mitigation, attackers can disrupt service availability by sending specially crafted HTTP requests with malicious Content-Type headers, leading to service outages or degraded performance.
Potential Impact
For European organizations, the impact of CVE-2024-24762 can be significant, particularly for those running Python-based web services or APIs that utilize the python-multipart library for handling multipart form data. The denial of service caused by this vulnerability can lead to service unavailability, affecting customer-facing applications, internal tools, or critical infrastructure services. This can result in operational disruption, loss of user trust, and potential financial losses due to downtime. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often rely on web applications for critical operations, may face increased risk. Additionally, the asynchronous nature of many modern Python web frameworks used in Europe amplifies the impact since the main event loop blocking can halt all request processing. While there is no direct data breach risk, the availability impact alone can be severe, especially for services with high traffic or real-time processing requirements. The lack of required authentication or user interaction lowers the barrier for exploitation, making it easier for remote attackers to launch denial of service attacks without prior access. Given the widespread use of Python in European software development, the vulnerability could affect a broad range of organizations if they have not updated to the patched version.
Mitigation Recommendations
1. Immediate upgrade to python-multipart version 0.0.7 or later, where the vulnerability is patched. This is the most effective and straightforward mitigation. 2. Implement input validation and sanitization at the application or web server level to detect and reject suspicious or malformed Content-Type headers before they reach the python-multipart parser. 3. Employ rate limiting and request throttling to reduce the impact of potential denial of service attempts by limiting the number of requests from a single source or IP address. 4. Use Web Application Firewalls (WAFs) with custom rules to detect and block requests with abnormal or suspicious Content-Type header patterns. 5. Monitor application logs and performance metrics for signs of high CPU usage or stalled event loops that could indicate exploitation attempts. 6. For asynchronous Python applications, consider isolating the multipart parsing logic in separate worker processes or threads to prevent the entire event loop from being blocked. 7. Educate development and security teams about this vulnerability to ensure timely patching and awareness of potential attack vectors. 8. Conduct regular dependency audits and integrate automated vulnerability scanning in CI/CD pipelines to detect outdated or vulnerable python-multipart versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2024-24762: CWE-400 Uncontrolled Resource Consumption in Kludex python-multipart
Description
`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
AI-Powered Analysis
Technical Analysis
CVE-2024-24762 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Kludex python-multipart library, a streaming multipart parser for Python. The vulnerability arises from the way python-multipart parses the HTTP Content-Type header when handling form data. Specifically, it uses a Regular Expression (RegEx) to parse the Content-Type header and its options. An attacker can craft a malicious Content-Type header with options designed to cause catastrophic backtracking or excessive processing time in the RegEx engine. This results in significant CPU resource consumption and stalls the main event loop of the affected process for minutes or longer. Because the main event loop is blocked, the process cannot handle additional incoming requests, effectively causing a Denial of Service (DoS) condition. The vulnerability affects version 0 of python-multipart and was patched in version 0.0.7. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on availability. There is no impact on confidentiality or integrity. No known exploits are currently reported in the wild. The vulnerability is particularly relevant for Python applications that rely on python-multipart to parse multipart form data, especially in web servers or APIs that handle file uploads or form submissions. Since the vulnerability blocks the main event loop, it is especially critical for asynchronous Python frameworks (e.g., FastAPI, Starlette) that depend on event loops for concurrency and responsiveness. Without mitigation, attackers can disrupt service availability by sending specially crafted HTTP requests with malicious Content-Type headers, leading to service outages or degraded performance.
Potential Impact
For European organizations, the impact of CVE-2024-24762 can be significant, particularly for those running Python-based web services or APIs that utilize the python-multipart library for handling multipart form data. The denial of service caused by this vulnerability can lead to service unavailability, affecting customer-facing applications, internal tools, or critical infrastructure services. This can result in operational disruption, loss of user trust, and potential financial losses due to downtime. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often rely on web applications for critical operations, may face increased risk. Additionally, the asynchronous nature of many modern Python web frameworks used in Europe amplifies the impact since the main event loop blocking can halt all request processing. While there is no direct data breach risk, the availability impact alone can be severe, especially for services with high traffic or real-time processing requirements. The lack of required authentication or user interaction lowers the barrier for exploitation, making it easier for remote attackers to launch denial of service attacks without prior access. Given the widespread use of Python in European software development, the vulnerability could affect a broad range of organizations if they have not updated to the patched version.
Mitigation Recommendations
1. Immediate upgrade to python-multipart version 0.0.7 or later, where the vulnerability is patched. This is the most effective and straightforward mitigation. 2. Implement input validation and sanitization at the application or web server level to detect and reject suspicious or malformed Content-Type headers before they reach the python-multipart parser. 3. Employ rate limiting and request throttling to reduce the impact of potential denial of service attempts by limiting the number of requests from a single source or IP address. 4. Use Web Application Firewalls (WAFs) with custom rules to detect and block requests with abnormal or suspicious Content-Type header patterns. 5. Monitor application logs and performance metrics for signs of high CPU usage or stalled event loops that could indicate exploitation attempts. 6. For asynchronous Python applications, consider isolating the multipart parsing logic in separate worker processes or threads to prevent the entire event loop from being blocked. 7. Educate development and security teams about this vulnerability to ensure timely patching and awareness of potential attack vectors. 8. Conduct regular dependency audits and integrate automated vulnerability scanning in CI/CD pipelines to detect outdated or vulnerable python-multipart versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-29T20:51:26.011Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7732
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:28:12 AM
Last updated: 8/20/2025, 5:04:24 AM
Views: 22
Related Threats
CVE-2025-8064: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in aicwebtech Bible SuperSearch
MediumCVE-2025-8895: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cozmoslabs WP Webhooks – Automate repetitive tasks by creating powerful automation workflows directly within WordPress
CriticalCVE-2025-7390: CWE-295 Improper Certificate Validation in Softing Industrial Automation GmbH OPC UA C++ SDK
CriticalCVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumCVE-2025-53504: Cross-site scripting (XSS) in Intermesh BV Group-Office
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.