CVE-2024-52804 – tornado
Package
Manager: pip
Name: tornado
Vulnerable Version: >=0 <6.4.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00434 pctl0.61979
Details
Tornado has an HTTP cookie parsing DoS vulnerability The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. See also CVE-2024-7592 for a similar vulnerability in cpython.
Metadata
Created: 2024-11-22T20:26:41Z
Modified: 2024-11-22T22:27:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-8w49-h785-mj3c/GHSA-8w49-h785-mj3c.json
CWE IDs: ["CWE-400", "CWE-770"]
Alternative ID: GHSA-8w49-h785-mj3c
Finding: F067
Auto approve: 1