7.5

CVE-2024-7592

Exploit

There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.


When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while parsing the
value.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PythonPython Version < 3.8.20
PythonPython Version >= 3.9.0 < 3.9.20
PythonPython Version >= 3.10.0 < 3.10.15
PythonPython Version >= 3.11.0 < 3.11.10
PythonPython Version >= 3.12.0 < 3.12.6
PythonPython Version3.13.0 Updatealpha0
PythonPython Version3.13.0 Updatealpha1
PythonPython Version3.13.0 Updatealpha2
PythonPython Version3.13.0 Updatealpha3
PythonPython Version3.13.0 Updatealpha4
PythonPython Version3.13.0 Updatealpha5
PythonPython Version3.13.0 Updatealpha6
PythonPython Version3.13.0 Updatebeta1
PythonPython Version3.13.0 Updatebeta2
PythonPython Version3.13.0 Updatebeta3
PythonPython Version3.13.0 Updatebeta4
PythonPython Version3.13.0 Updaterc1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.39% 0.593
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.