CVE-2024-10713 – hyperlpr3
Package
Manager: pip
Name: hyperlpr3
Vulnerable Version: >=0 <=3.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00106 pctl0.29343
Details
HyperLPR Denial of Service vulnerability A vulnerability in szad670401/hyperlpr v3.0 allows for a Denial of Service (DoS) attack. The server fails to handle excessive characters appended to the end of multipart boundaries, regardless of the character used. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary, leading to excessive resource consumption and a complete denial of service for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue.
Metadata
Created: 2025-03-20T12:32:40Z
Modified: 2025-03-21T15:30:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-cg4p-5qfm-pjjj/GHSA-cg4p-5qfm-pjjj.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-cg4p-5qfm-pjjj
Finding: F002
Auto approve: 1