Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-6827

Опубликовано: 20 мар. 2025
Источник: debian
EPSS Низкий

Описание

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gunicornfixed23.0.0-1package
gunicornno-dsabookwormpackage
gunicornpostponedbullseyepackage

Примечания

  • https://huntr.com/bounties/1b4f8f38-39da-44b6-9f98-f618639d0dd7

  • Fixed by: https://github.com/benoitc/gunicorn/commit/555d2fa27f2d891f23bd03890e4a826b5018c6b4 (23.0.0)

EPSS

Процентиль: 12%
0.00041
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
9 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
redhat
9 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
nvd
9 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

suse-cvrf
8 месяцев назад

Security update for python-gunicorn

suse-cvrf
8 месяцев назад

Security update for python-gunicorn

EPSS

Процентиль: 12%
0.00041
Низкий