Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-6827

Опубликовано: 20 мар. 2025
Источник: debian

Описание

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gunicornfixed23.0.0-1package
gunicornno-dsabookwormpackage
gunicornpostponedbullseyepackage

Примечания

  • https://huntr.com/bounties/1b4f8f38-39da-44b6-9f98-f618639d0dd7

  • Fixed by: https://github.com/benoitc/gunicorn/commit/555d2fa27f2d891f23bd03890e4a826b5018c6b4 (23.0.0)

Связанные уязвимости

CVSS3: 7.5
ubuntu
11 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
redhat
11 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
nvd
11 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

suse-cvrf
11 месяцев назад

Security update for python-gunicorn

suse-cvrf
11 месяцев назад

Security update for python-gunicorn