Skip to content
This repository has been archived by the owner on May 22, 2024. It is now read-only.

[Synk:High] Gunicorn (Due 05/17/2024) #850

Open
1 task
tmpayton opened this issue Apr 17, 2024 · 0 comments
Open
1 task

[Synk:High] Gunicorn (Due 05/17/2024) #850

tmpayton opened this issue Apr 17, 2024 · 0 comments
Labels
Security: high Remediate within 30 days
Milestone

Comments

@tmpayton
Copy link
Contributor

Introduced through
[email protected]

Exploit maturity
PROOF OF CONCEPT

Detailed paths
Introduced through: [email protected][email protected]

Fix: No remediation path available.
Security information
Factors contributing to the scoring:
Snyk: CVSS 7.5 - High Severity

NVD: Not available. NVD has not yet published its analysis.
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
gunicorn is a Python WSGI HTTP Server for UNIX

Affected versions of this package are vulnerable to HTTP Request Smuggling due to the improper validation of Transfer-Encoding headers. An attacker can bypass security restrictions and access restricted endpoints by crafting requests with conflicting Transfer-Encoding headers.

Notes:

This is only exploitable if users have a network path which does not filter out invalid requests;

Users are advised to block access to restricted endpoints via a firewall or other mechanism until a fix can be developed.

This issue arises from the application's incorrectly processing of requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified.

Completion Criteria

  • Upgrade Gunicorn once patched version is available
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Security: high Remediate within 30 days
Projects
Archived in project
Development

No branches or pull requests

1 participant