Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-40217

Опубликовано: 25 авг. 2023
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

Python ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.

Отчет

Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as 'Not affected' as they just provide "symlinks" to the main python3 component, which provides the actual interpreter of the Python programming language.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8python36:3.6/python36Not affected
Red Hat Enterprise Linux 6 Extended Lifecycle SupportpythonFixedRHSA-2023:629002.11.2023
Red Hat Enterprise Linux 7python3FixedRHSA-2023:682308.11.2023
Red Hat Enterprise Linux 7pythonFixedRHSA-2023:688513.11.2023
Red Hat Enterprise Linux 8python3.11FixedRHSA-2023:546305.10.2023
Red Hat Enterprise Linux 8python27FixedRHSA-2023:599423.10.2023
Red Hat Enterprise Linux 8python3FixedRHSA-2023:599723.10.2023
Red Hat Enterprise Linux 8python39FixedRHSA-2023:599823.10.2023
Red Hat Enterprise Linux 8python39-develFixedRHSA-2023:599823.10.2023
Red Hat Enterprise Linux 8python3FixedRHSA-2023:599723.10.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-305

EPSS

Процентиль: 52%
0.00284
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

CVSS3: 5.3
nvd
почти 2 года назад

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
почти 2 года назад

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, ...

suse-cvrf
больше 1 года назад

Security update for python

EPSS

Процентиль: 52%
0.00284
Низкий

8.6 High

CVSS3