Описание
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts ([]
), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
A flaw was found in Python. The urllib.parse.urlsplit()
and urlparse()
functions improperly validated bracketed hosts ([]
), allowing hosts that weren't IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.
Отчет
Within regulated environments, a combination of the following controls act as a significant barrier to successful exploitation of a CWE-1287: Improper Validation of Specified Type of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform's strict role-based access control (RBAC), namespace isolation, and pod-level security constraints limit the exposure and potential impact of malformed or incorrectly typed input. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention, which helps detect of input-based manipulation attempts. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Additionally, process isolation ensures that compromised components are contained within the originating process, preventing it from affecting other processes or the system as a whole.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | python3.11 | Not affected | ||
Red Hat Enterprise Linux 8 | python3.12 | Not affected | ||
Red Hat Enterprise Linux 9 | python3.11 | Not affected | ||
Red Hat Enterprise Linux 9 | python3.12 | Not affected | ||
Red Hat Enterprise Linux 8 | python3 | Fixed | RHSA-2024:10779 | 04.12.2024 |
Red Hat Enterprise Linux 8 | python3 | Fixed | RHSA-2024:10779 | 04.12.2024 |
Red Hat Enterprise Linux 9 | python3.9 | Fixed | RHSA-2024:10983 | 12.12.2024 |
Red Hat Enterprise Linux 9 | python3.9 | Fixed | RHSA-2024:10983 | 12.12.2024 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
3.7 Low
CVSS3
Связанные уязвимости
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
The urllib.parse.urlsplit() and urlparse() functions improperly valida ...
EPSS
3.7 Low
CVSS3