AI description
CVE-2025-47287 affects the Tornado Python web framework and asynchronous networking library. The vulnerability stems from how Tornado's `multipart/form-data` parser handles errors. When the parser encounters malformed data, it logs a warning but continues parsing the remaining data instead of halting the process. This behavior allows remote attackers to generate a high volume of logs by sending crafted requests with malformed multipart form data. The excessive logging can overwhelm the logging subsystem, leading to a denial-of-service (DoS) attack because the logging subsystem operates synchronously. All Tornado versions prior to 6.5.0 are affected. A fix is available by upgrading to Tornado version 6.5.0. As a workaround, blocking `Content-Type: multipart/form-data` in a proxy can mitigate the risk.
- Description
- Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.
- Source
- security-advisories@github.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-770
- Hype score
- Not currently trending
⚠️ CVE-2025-47287 Alert: #Ubuntu’s Tornado web server has a resource exhaustion flaw—attackers can trigger DoS via malformed requests. 📌 Affected versions: 22.04-25.04 🔐 Fix: sudo apt upgrade python3-tornado. Read more: 👉 https://t.co/Mqadg3gG1F #Py
@Cezar_H_Linux
2 Jun 2025
40 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical update for #python-tornado6 users! CVE-2025-47287 (CVSS 8.7) lets attackers crash systems via malformed HTTP data. Patch SUSE Linux 15 SP7 now: ✅ zypper patch ✅ YaST update Read more: 👇https://t.co/D2GFO0fmme #InfoSec #SUSE https://t.co/T4FUuf98rA
@Cezar_H_Linux
24 May 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: High DoS Risk: Tornado's Default Parser Exposes Apps (CVE-2025-47287) CVE-2025-47287 Severity: 🔴 High Maturity: 💢 Emerging Learn more: https://t.co/PVLGWF4USw #CyberSecurity #ThreatIntel #InfoSec
@fletch_ai
20 May 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-47287: High DoS Risk: Tornado’s Default Parser Exposes Apps 🎯1.4M+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link: https://t.co/LoDPA2djr0 FOFA Query:app="Tornado-Server" 🔖Refer:https://t.co/T1HkGOqAsR #OSINT #FOFA #Cyber
@fofabot
19 May 2025
855 Impressions
3 Retweets
11 Likes
4 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨CVE-2025-47287 : A Denial of Service (DoS) Vulnerability Exists in https://t.co/qeefU6x6io affects versions prior to 6.5.0. 📊 2.2M+ Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/sArfLGsXqo 👇Query HUNTER : https://t.co/hJ
@HunterMapping
19 May 2025
2392 Impressions
7 Retweets
44 Likes
9 Bookmarks
1 Reply
0 Quotes