Lucene search

K
cve[email protected]CVE-2023-24329
HistoryFeb 17, 2023 - 3:15 p.m.

CVE-2023-24329

2023-02-1715:15:12
CWE-20
web.nvd.nist.gov
749
security
python
urllib.parse
cve-2023-24329
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.5%

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

Affected configurations

NVD
Node
pythonpythonRange<3.7.17
OR
pythonpythonRange3.8.03.8.17
OR
pythonpythonRange3.9.03.9.17
OR
pythonpythonRange3.10.03.10.12
OR
pythonpythonRange3.11.03.11.4
Node
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38
Node
netappactive_iq_unified_managerMatch-vmware_vsphere
OR
netappactive_iq_unified_managerMatch-windows
OR
netappmanagement_services_for_element_softwareMatch-
OR
netappmanagement_services_for_netapp_hciMatch-
OR
netappontap_select_deploy_administration_utilityMatch-

References

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.5%