You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Werkzeug is a Web Server Gateway Interface web application library. Applications using werkzeug.formparser.MultiPartParser corresponding to a version of Werkzeug prior to 3.0.6 to parse multipart/form-data requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, os.path.isabs() does not catch UNC paths like //server/share. Werkzeug's safe_join() relies on this check, and so can produce a path that is not safe, potentially allowing unintended access to data. Applications using Python >= 3.11, or not using Windows, are not vulnerable. Werkzeug version 3.0.6 contains a patch.
mend-bolt-for-githubbot
changed the title
werkzeug-3.0.3-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.5)
werkzeug-3.0.3-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.5) - autoclosed
Feb 21, 2025
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
The comprehensive WSGI web application library.
Library home page: https://files.pythonhosted.org/packages/9d/6e/e792999e816d19d7fcbfa94c730936750036d65656a76a5a688b57a656c4/werkzeug-3.0.3-py3-none-any.whl
Path to dependency file: /docker/kubedash/requirements.txt
Path to vulnerable library: /docker/kubedash/requirements.txt,/src/kubedash/requirements.txt
Found in HEAD commit: 06dd95b79b589b6efc59ac17fc5ed74af2eed466
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - werkzeug-3.0.3-py3-none-any.whl
The comprehensive WSGI web application library.
Library home page: https://files.pythonhosted.org/packages/9d/6e/e792999e816d19d7fcbfa94c730936750036d65656a76a5a688b57a656c4/werkzeug-3.0.3-py3-none-any.whl
Path to dependency file: /docker/kubedash/requirements.txt
Path to vulnerable library: /docker/kubedash/requirements.txt,/src/kubedash/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 06dd95b79b589b6efc59ac17fc5ed74af2eed466
Found in base branch: main
Vulnerability Details
Werkzeug is a Web Server Gateway Interface web application library. Applications using
werkzeug.formparser.MultiPartParser
corresponding to a version of Werkzeug prior to 3.0.6 to parsemultipart/form-data
requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.Publish Date: 2024-10-25
URL: CVE-2024-49767
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-q34m-jh98-gwm2
Release Date: 2024-10-25
Fix Resolution: quart - 0.19.7;werkzeug - 3.0.6
Step up your Open Source Security Game with Mend here
Vulnerable Library - werkzeug-3.0.3-py3-none-any.whl
The comprehensive WSGI web application library.
Library home page: https://files.pythonhosted.org/packages/9d/6e/e792999e816d19d7fcbfa94c730936750036d65656a76a5a688b57a656c4/werkzeug-3.0.3-py3-none-any.whl
Path to dependency file: /docker/kubedash/requirements.txt
Path to vulnerable library: /docker/kubedash/requirements.txt,/src/kubedash/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 06dd95b79b589b6efc59ac17fc5ed74af2eed466
Found in base branch: main
Vulnerability Details
Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, os.path.isabs() does not catch UNC paths like //server/share. Werkzeug's safe_join() relies on this check, and so can produce a path that is not safe, potentially allowing unintended access to data. Applications using Python >= 3.11, or not using Windows, are not vulnerable. Werkzeug version 3.0.6 contains a patch.
Publish Date: 2024-10-25
URL: CVE-2024-49766
CVSS 3 Score Details (3.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-f9vj-2wh5-fj8j
Release Date: 2024-10-25
Fix Resolution: Werkzeug - 3.0.6
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: