Lucene search

K
mageiaGentoo FoundationMGASA-2024-0236
HistoryJun 24, 2024 - 10:04 p.m.

Updated python-gunicorn packages fix security vulnerability

2024-06-2422:04:12
Gentoo Foundation
advisories.mageia.org
11
gunicorn
transfer-encoding
http request smuggling
security restrictions
endpoints
cache poisoning
session manipulation
data exposure
vulnerability fix
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn’s handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability allows for a range of attacks including cache poisoning, session manipulation, and data exposure.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchpython-gunicorn< 22.0.0-1python-gunicorn-22.0.0-1.mga9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%