Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-8466— Unbounded buffer accumulation in multipart header parsing causes denial of service in cowboy

AI Predicted 7.5 Difficulty: Easy EPSS 0.02% · P5

Affected Version Matrix 2

VendorProductVersion RangeStatus
nineninescowboy2.0.0< 2.15.0affected
917cf99e10c41676183d501b86af6e47c95afb89< 5c6a2061b41bb5771c4659fac7d5a822dca5bafbaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-8466

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unbounded buffer accumulation in multipart header parsing causes denial of service in cowboy
Source: NVD (National Vulnerability Database)
Vulnerability Description
Allocation of Resources Without Limits or Throttling vulnerability in ninenines cowboy allows denial of service via unbounded buffer accumulation in multipart header parsing. cowboy_req:read_part/3 in src/cowboy_req.erl accumulates incoming request bytes into a Buffer binary with no upper-bound check. When cow_multipart:parse_headers/2 returns more or {more, Buffer2}, the function reads up to Length bytes (default 64 KB) from the request body and recurses with the enlarged buffer. There is no equivalent of the byte_size(Acc) > Length guard present in the sibling function read_part_body/4. An unauthenticated attacker can send a multipart/form-data request whose body never yields a complete header section — for example, a body that never contains the advertised boundary delimiter, or one whose header lines never contain \r\n\r\n — and force the server process to accumulate memory linearly with the bytes the protocol layer is willing to deliver. A handful of concurrent such uploads is sufficient to exhaust BEAM memory. This issue affects cowboy from 2.0.0 before 2.15.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cowboy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cowboy是Nine Nines开源的一款基于Erlang/OTP的轻量高性能HTTP服务器。 Cowboy 2.0.0版本至2.15.0之前版本存在安全漏洞,该漏洞源于多部分标头解析中无限制的缓冲区累积,可能导致未经身份验证的攻击者通过发送不完整的多部分请求耗尽BEAM内存,造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nineninescowboy 2.0.0 ~ 2.15.0 cpe:2.3:a:ninenines:cowboy:*:*:*:*:*:*:*:*
nineninescowboy 917cf99e10c41676183d501b86af6e47c95afb89 ~ 5c6a2061b41bb5771c4659fac7d5a822dca5bafb cpe:2.3:a:ninenines:cowboy:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-8466

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-8466

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-8466

No comments yet


Leave a comment