Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-6827

Опубликовано: 20 мар. 2025
Источник: debian
EPSS Низкий

Описание

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gunicornfixed23.0.0-1package
gunicornno-dsabookwormpackage
gunicornpostponedbullseyepackage

Примечания

  • https://huntr.com/bounties/1b4f8f38-39da-44b6-9f98-f618639d0dd7

  • Fixed by: https://github.com/benoitc/gunicorn/commit/555d2fa27f2d891f23bd03890e4a826b5018c6b4 (23.0.0)

EPSS

Процентиль: 22%
0.00072
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
10 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
redhat
10 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
nvd
10 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

suse-cvrf
10 месяцев назад

Security update for python-gunicorn

suse-cvrf
10 месяцев назад

Security update for python-gunicorn

EPSS

Процентиль: 22%
0.00072
Низкий