Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-58068

Опубликовано: 29 авг. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.1

Описание

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

РелизСтатусПримечание
devel

released

0.39.0-0ubuntu2
esm-infra/bionic

needs-triage

esm-infra/focal

released

0.25.1-2ubuntu1.1+esm2
esm-infra/xenial

needs-triage

jammy

released

0.30.2-5ubuntu2.2
noble

released

0.35.2-0ubuntu1.1
plucky

released

0.39.0-0ubuntu1.1
questing

released

0.39.0-0ubuntu2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 13%
0.00044
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
4 месяца назад

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

CVSS3: 9.1
nvd
4 месяца назад

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

CVSS3: 9.1
debian
4 месяца назад

Eventlet is a concurrent networking library for Python. Prior to versi ...

suse-cvrf
3 месяца назад

Security update for python-eventlet

suse-cvrf
4 месяца назад

Security update for python-eventlet

EPSS

Процентиль: 13%
0.00044
Низкий

9.1 Critical

CVSS3

Уязвимость CVE-2025-58068