{"id":"CVE-2024-49767","summary":"Werkzeug possible resource exhaustion when parsing file data in forms","details":"Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.","aliases":["GHSA-q34m-jh98-gwm2"],"modified":"2026-04-16T04:30:56.707540268Z","published":"2024-10-25T19:41:35.029Z","related":["CGA-h8v7-4923-8jff","SUSE-SU-2024:3810-1","openSUSE-SU-2024:14437-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49767.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-400","CWE-770"]},"references":[{"type":"WEB","url":"https://github.com/pallets/werkzeug/releases/tag/3.0.6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49767.json"},{"type":"ADVISORY","url":"https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49767"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250103-0007/"},{"type":"FIX","url":"https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"},{"type":"FIX","url":"https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f"},{"type":"FIX","url":"https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pallets/quart","events":[{"introduced":"0"},{"fixed":"0c91e8e5cd35eb0b8629672627decd528f1f2bbf"},{"fixed":"5e78c4169b8eb66b91ead3e62d44721b9e1644ee"},{"fixed":"abb04a512496206de279225340ed022852fbf51f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.19.7"}]}}],"versions":["0.1.0","0.10.0","0.11.0","0.11.1","0.11.2","0.11.3","0.11.4","0.11.5","0.12.0","0.13.0","0.13.1","0.14.0","0.14.1","0.15.0","0.15.1","0.16.0","0.16.2","0.17.0","0.18.0","0.18.1","0.18.2","0.18.3","0.19.0","0.19.1","0.19.2","0.19.3","0.19.4","0.19.5","0.19.6","0.2.0","0.3.0","0.3.1","0.4.0","0.4.1","0.5.0","0.6.0","0.6.1","0.6.2","0.6.3","0.6.4","0.6.5","0.7.0","0.7.1","0.8.0","0.8.1","0.9.0","0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49767.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/pallets/werkzeug","events":[{"introduced":"0"},{"fixed":"5eaefc3996aa5cc8c5237d8b82f1b89eed6ea624"}]}],"versions":["0.1","0.10","0.11","0.12","0.13","0.14","0.15.0","0.2","0.3","0.4","0.4.1","0.6","0.6.1","0.6.2","0.7","0.8","0.9","1.0.0","1.0.0rc1","2.0.0","2.0.0rc1","2.0.0rc2","2.0.0rc3","2.0.0rc4","2.0.0rc5","2.1.0","2.2.0","2.2.0a1","3.0.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49767.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}]}