Skip to content

When parsing a multipart form (either explicitly with...

Unreviewed Published Mar 6, 2024 to the GitHub Advisory Database • Updated May 1, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.

References

Published by the National Vulnerability Database Mar 5, 2024
Published to the GitHub Advisory Database Mar 6, 2024
Last updated May 1, 2024

Severity

Unknown

Weaknesses

No CWEs

CVE ID

CVE-2023-45290

GHSA ID

GHSA-rr6r-cfgf-gc6h

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Checking history
See something to contribute? Suggest improvements for this vulnerability.