CVE-2024-52804
Description
Tornado is a Python web framework and asynchronous networking library. The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue.
CWE
- CWE-400 — CWE-400: Uncontrolled Resource Consumption
- CWE-770 — CWE-770: Allocation of Resources Without Limits or Throttling
Affected
- tornadoweb / tornado — v=< 6.4.2 [affected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
- https://github.com/tornadoweb/tornado/security/advisories/GHSA-8w49-h785-mj3c x_refsource_CONFIRM
- https://github.com/tornadoweb/tornado/commit/d5ba4a1695fbf7c6a3e54313262639b198291533 x_refsource_MISC
- https://github.com/advisories/GHSA-7pwv-g7hj-39pr x_refsource_MISC
Source
cvelistV5-main/cves/2024/52xxx/CVE-2024-52804.json