CVE-2023-45290

6.5 MEDIUM
Published: March 05, 2024 Modified: April 15, 2026
View on NVD

Description

When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://go.dev/cl/569341
Source: security@golang.org
https://go.dev/issue/65383
Source: security@golang.org
https://pkg.go.dev/vuln/GO-2024-2599
Source: security@golang.org
http://www.openwall.com/lists/oss-security/2024/03/08/4
Source: af854a3a-2127-422b-91ae-364da2661108
https://go.dev/cl/569341
Source: af854a3a-2127-422b-91ae-364da2661108
https://go.dev/issue/65383
Source: af854a3a-2127-422b-91ae-364da2661108
https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
Source: af854a3a-2127-422b-91ae-364da2661108
https://pkg.go.dev/vuln/GO-2024-2599
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20240329-0004/
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
0.5%
66th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)