CVE-2023-45290

When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
Configurations

No configuration.

History

21 Nov 2024, 08:26

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/03/08/4 - () http://www.openwall.com/lists/oss-security/2024/03/08/4 -
References () https://go.dev/cl/569341 - () https://go.dev/cl/569341 -
References () https://go.dev/issue/65383 - () https://go.dev/issue/65383 -
References () https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg - () https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg -
References () https://pkg.go.dev/vuln/GO-2024-2599 - () https://pkg.go.dev/vuln/GO-2024-2599 -
References () https://security.netapp.com/advisory/ntap-20240329-0004/ - () https://security.netapp.com/advisory/ntap-20240329-0004/ -

07 Nov 2024, 11:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-770

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/08/4 -

29 Mar 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240329-0004/ -

05 Mar 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-05 23:15

Updated : 2024-11-21 08:26


NVD link : CVE-2023-45290

Mitre link : CVE-2023-45290

CVE.ORG link : CVE-2023-45290


JSON object : View

Products Affected

No product.

CWE
CWE-770

Allocation of Resources Without Limits or Throttling