Логотип exploitDog
bind:CVE-2025-58068
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-58068

Количество 6

Количество 6

ubuntu логотип

CVE-2025-58068

9 дней назад

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

EPSS: Низкий
redhat логотип

CVE-2025-58068

9 дней назад

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-58068

9 дней назад

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

EPSS: Низкий
debian логотип

CVE-2025-58068

9 дней назад

Eventlet is a concurrent networking library for Python. Prior to versi ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03051-1

5 дней назад

Security update for python-eventlet

EPSS: Низкий
github логотип

GHSA-hw6f-rjfj-j7j7

9 дней назад

Eventlet affected by HTTP request smuggling in unparsed trailers

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-58068

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

0%
Низкий
9 дней назад
redhat логотип
CVE-2025-58068

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

CVSS3: 6.5
0%
Низкий
9 дней назад
nvd логотип
CVE-2025-58068

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.

0%
Низкий
9 дней назад
debian логотип
CVE-2025-58068

Eventlet is a concurrent networking library for Python. Prior to versi ...

0%
Низкий
9 дней назад
suse-cvrf логотип
SUSE-SU-2025:03051-1

Security update for python-eventlet

0%
Низкий
5 дней назад
github логотип
GHSA-hw6f-rjfj-j7j7

Eventlet affected by HTTP request smuggling in unparsed trailers

0%
Низкий
9 дней назад

Уязвимостей на страницу