Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-11168

Опубликовано: 12 нояб. 2024
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts ([]), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

A flaw was found in Python. The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts ([]), allowing hosts that weren't IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.

Отчет

Within regulated environments, a combination of the following controls act as a significant barrier to successful exploitation of a CWE-1287: Improper Validation of Specified Type of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform's strict role-based access control (RBAC), namespace isolation, and pod-level security constraints limit the exposure and potential impact of malformed or incorrectly typed input. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention, which helps detect of input-based manipulation attempts. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Additionally, process isolation ensures that compromised components are contained within the originating process, preventing it from affecting other processes or the system as a whole.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8python3.11Not affected
Red Hat Enterprise Linux 8python3.12Not affected
Red Hat Enterprise Linux 9python3.11Not affected
Red Hat Enterprise Linux 9python3.12Not affected
Red Hat Enterprise Linux 8python3FixedRHSA-2024:1077904.12.2024
Red Hat Enterprise Linux 8python3FixedRHSA-2024:1077904.12.2024
Red Hat Enterprise Linux 9python3.9FixedRHSA-2024:1098312.12.2024
Red Hat Enterprise Linux 9python3.9FixedRHSA-2024:1098312.12.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1287
https://bugzilla.redhat.com/show_bug.cgi?id=2325776python: Improper validation of IPv6 and IPvFuture addresses

EPSS

Процентиль: 42%
0.00198
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
7 месяцев назад

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

CVSS3: 3.7
nvd
7 месяцев назад

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

CVSS3: 3.7
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 3.7
debian
7 месяцев назад

The urllib.parse.urlsplit() and urlparse() functions improperly valida ...

suse-cvrf
3 месяца назад

Security update for python3

EPSS

Процентиль: 42%
0.00198
Низкий

3.7 Low

CVSS3