Fix CVE-2024-29025 in v4.1.100.Final #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR backports the security fixes into the v4.1.100.Final branch to remediate the critical CVE-2024-29025 vulnerability. The vulnerability allows attackers to exhaust server memory by submitting unlimited small fields or a growing incomplete field, leading to resource exhaustion, degraded service, or eventual crash (OOM). These risks apply to any application accepting form or multipart HTTP uploads.
Overview of Changes
This PR modifies 4 files:
TooManyFormFieldsException,TooLongFormFieldException) are thrown under attack scenarios. Included default limit configuration tests ensuring fallback protections.Backporting these changes allows users constrained to 4.1.100.Final to benefit from the critical security safeguards introduced in 4.1.108.Final without requiring a full upgrade path.