You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tornado is a Python web framework and asynchronous networking library. The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue.
Vulnerable Library - sphinx_autobuild-2021.3.14-py3-none-any.whl
Path to dependency file: /docs/requirements.txt
Path to vulnerable library: /tmp/ws-ua_20241120084337_VIQHJP/python_GUCVUX/202411200844401/env/lib/python3.8/site-packages/tornado-6.4.1.dist-info
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-52804
Vulnerable Library - tornado-6.4.1-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Library home page: https://files.pythonhosted.org/packages/22/d4/54f9d12668b58336bd30defe0307e6c61589a3e687b05c366f804b7faaf0/tornado-6.4.1-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Path to dependency file: /docs/requirements.txt
Path to vulnerable library: /tmp/ws-ua_20241120084337_VIQHJP/python_GUCVUX/202411200844401/env/lib/python3.8/site-packages/tornado-6.4.1.dist-info
Dependency Hierarchy:
Found in base branch: develop
Vulnerability Details
Tornado is a Python web framework and asynchronous networking library. The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue.
Publish Date: 2024-11-22
URL: CVE-2024-52804
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-52804
Release Date: 2024-11-22
Fix Resolution (tornado): 6.4.2
Direct dependency fix Resolution (sphinx-autobuild): 2024.2.4
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: