CVE-2024-7592

There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*

History

04 Sep 2024, 21:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06 -
  • () https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a -
  • () https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f -
  • () https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774 -

03 Sep 2024, 15:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621 -
  • () https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1 -

20 Aug 2024, 16:02

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de gravedad BAJA que afecta a CPython, específicamente al módulo de librería estándar 'http.cookies'. Al analizar cookies que contenían barras invertidas para caracteres entrecomillados en el valor de la cookie, el analizador usaría un algoritmo con complejidad cuadrática, lo que resultaría en un exceso de recursos de CPU que se usarían al analizar el valor.
CWE CWE-1333
First Time Python python
Python
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*
References () https://github.com/python/cpython/issues/123067 - () https://github.com/python/cpython/issues/123067 - Exploit, Issue Tracking, Patch
References () https://github.com/python/cpython/pull/123075 - () https://github.com/python/cpython/pull/123075 - Issue Tracking, Patch
References () https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ - () https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ - Mailing List

19 Aug 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-19 19:15

Updated : 2024-09-04 21:15


NVD link : CVE-2024-7592

Mitre link : CVE-2024-7592

CVE.ORG link : CVE-2024-7592


JSON object : View

Products Affected

python

  • python
CWE
CWE-1333

Inefficient Regular Expression Complexity

CWE-400

Uncontrolled Resource Consumption