GHSA-cg4p-5qfm-pjjj

Suggest an improvement
Source
https://github.com/advisories/GHSA-cg4p-5qfm-pjjj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-cg4p-5qfm-pjjj/GHSA-cg4p-5qfm-pjjj.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-cg4p-5qfm-pjjj
Aliases
  • CVE-2024-10713
Published
2025-03-20T12:32:40Z
Modified
2025-03-21T15:52:05.917153Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
HyperLPR Denial of Service vulnerability
Details

A vulnerability in szad670401/hyperlpr v3.0 allows for a Denial of Service (DoS) attack. The server fails to handle excessive characters appended to the end of multipart boundaries, regardless of the character used. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary, leading to excessive resource consumption and a complete denial of service for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2025-03-20T10:15:18Z",
    "severity": "HIGH",
    "github_reviewed_at": "2025-03-21T15:30:34Z",
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

PyPI / hyperlpr3

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.0

Affected versions

0.*

0.1.3