Allocation of Resources Without Limits or Throttling Affecting jupyter-base-notebook package, versions <7.4.2-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.13% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-JUPYTERBASENOTEBOOK-10186819
  • published21 May 2025
  • disclosed15 May 2025

Introduced: 15 May 2025

NewCVE-2025-47287  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Chainguard jupyter-base-notebook to version 7.4.2-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jupyter-base-notebook package and not the jupyter-base-notebook package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Tornado is a Python web framework and asynchronous networking library. When Tornado's multipart/form-data parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking Content-Type: multipart/form-data in a proxy.

CVSS Base Scores

version 3.1