global-attribution-mapping
global-attribution-mapping copied to clipboard
tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl: 1 vulnerabilities (highest severity is: 7.5)
Vulnerable Library - tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20250423134520_RSTRUL/python_EXEDNB/20250423134523/tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (tornado version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-47287 | 7.5 | tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl | Direct | tornado - 6.5 | ✅ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-47287
Vulnerable Library - tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20250423134520_RSTRUL/python_EXEDNB/20250423134523/tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Dependency Hierarchy:
- :x: tornado-6.4.2-cp38-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Tornado is a Python web framework and asynchronous networking library. When Tornado's "multipart/form-data" parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking "Content-Type: multipart/form-data" in a proxy.
Publish Date: 2025-05-15
URL: CVE-2025-47287
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://github.com/tornadoweb/tornado/security/advisories/GHSA-7cx3-6m66-7c5m
Release Date: 2025-05-15
Fix Resolution: tornado - 6.5
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.