Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-6827

Опубликовано: 20 мар. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

A flaw was found in Gunicorn. This vulnerability allows request smuggling, leading to cache poisoning, data exposure, session manipulation, Server-side request forgery (SSRF), Cross-site scripting (XSS), denial of service (DoS), data integrity compromise, security bypass, and information leakage via improper validation of the 'Transfer-Encoding' header.

Меры по смягчению последствий

Red Hat Product Security currently does not have a recommended mitigation at this time.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Serverlessopenshift-serverless-1/kn-plugin-func-func-util-rhel8Affected
Red Hat Quay 3quay/quay-rhel8Affected
Discovery 1 for RHEL 9discovery/discovery-server-rhel9FixedRHSA-2025:370908.04.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2353700gunicorn: HTTP Request Smuggling in benoitc/gunicorn

EPSS

Процентиль: 12%
0.00041
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
9 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
nvd
9 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

CVSS3: 7.5
debian
9 месяцев назад

Gunicorn version 21.2.0 does not properly validate the value of the 'T ...

suse-cvrf
8 месяцев назад

Security update for python-gunicorn

suse-cvrf
8 месяцев назад

Security update for python-gunicorn

EPSS

Процентиль: 12%
0.00041
Низкий

7.5 High

CVSS3