On 05/08/2025 07:03, 加治屋 一輝 wrote:
Thank you for your response, Mark. Based on your answer, I have confirmed the 
settings.
Please confirm the settings for maxPostSize and maxFileSize.

The settings are as follows.
- maxPostSize: set on the Connector. Sets the maximum total size for all 
non-file parts
- maxFileSize: set on the multi-part configuration. Sets the maximum size for a 
single part (file and non-file)

We have set maxPostSize in our environment, but we have not set maxFileSize.
When sending files in multipart format via a POST request, the maxPostSize 
limit is reached, and large files cannot be transmitted.
In other words, we believe that maxPostSize limits the total size of the entire 
POST, including files, but is this incorrect?

Generally, yes. It is incorrect. But it depends. There are circumstances in which maxPostSize is used as the default for maxFileSize.

To analyse your configuration we would need to see:
- the full connector configuration
- the multi-part configuration used by the servlet (could be in web.xml or in an annotation)

The implementation we investigated is as follows.

<form id="mainForm" name="mainForm" action="/hoge/hoge" method="post" enctype="multipart/form-data" 
onsubmit="return false;" autocomplete="off">

That is client-side code and plays not role (apart from defining the upload format) in how Tomcat handles the request.

All of that said, the size of an uploaded file does not count towards the limit set by maxPostSize.

Mark



Please confirm the above.
________________________________
差出人: Mark Thomas <ma...@apache.org>
送信日時: 2025年7月25日 15:40
宛先: users@tomcat.apache.org <users@tomcat.apache.org>
件名: Re: [SECURITY INQUIRY] CVE-2025-52520: Regarding "Unlikely Configurations of 
Multipart Upload" that are Affected

On 25/07/2025 03:42, 加治屋 一輝 wrote:

<snip/>

Specifically, the following point is unclear to us:
    The advisory mentions "unlikely configurations of multipart upload." Could you please 
specify what types of configurations are considered "unlikely" and would therefore be 
affected by this vulnerability? Please provide specific examples or characteristics.

There are various limits that apply to a multi-part upload. The ones
that matter in this scenario are:

- maxPostSize: set on the Connector. Sets the maximum total size for
                 all non-file parts
- maxFileSize: set on the multi-part configuration. Sets the maximum
                 size for a single part (file and non-file)

If maxFileSize + maxPostSize > 2^31 then it was possible to bypass
maxPostSize, load large non-file parts into memory and (with enough
non-file parts / requests) trigger a DoS.

The unlikely aspect was that untrusted users would be allowed to upload
files ~2Gb in size.

Kind regards,

Mark


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to