Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13M2gzLTRyajctNHBoNM4AA7B3
Request smuggling leading to endpoint restriction bypass in Gunicorn
Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability has been shown to allow access to endpoints restricted by gunicorn. This issue has been addressed in version 22.0.0.
To be affected users must have a network path which does not filter out invalid requests. These users are advised to block access to restricted endpoints via a firewall or other mechanism if they are unable to update.
Permalink: https://github.com/advisories/GHSA-w3h3-4rj7-4ph4JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13M2gzLTRyajctNHBoNM4AA7B3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 8 months ago
Updated: 5 months ago
CVSS Score: 8.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Identifiers: GHSA-w3h3-4rj7-4ph4, CVE-2024-1135
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-1135
- https://huntr.com/bounties/22158e34-cfd5-41ad-97e0-a780773d96c1
- https://github.com/benoitc/gunicorn/commit/ac29c9b0a758d21f1e0fb3b3457239e523fa9f1d
- https://github.com/benoitc/gunicorn/releases/tag/22.0.0
- https://lists.debian.org/debian-lts-announce/2024/06/msg00027.html
- https://github.com/advisories/GHSA-w3h3-4rj7-4ph4
Blast Radius: 44.6
Affected Packages
pypi:gunicorn
Dependent packages: 771Dependent repositories: 277,527
Downloads: 66,069,846 last month
Affected Version Ranges: < 22.0.0
Fixed in: 22.0.0
All affected versions: 0.2.1, 0.3.1, 0.3.2, 0.4.1, 0.4.2, 0.5.1, 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.6.5, 0.6.6, 0.7.0, 0.7.1, 0.7.2, 0.8.0, 0.8.1, 0.9.0, 0.9.1, 0.10.0, 0.10.1, 0.11.0, 0.11.1, 0.11.2, 0.12.0, 0.12.1, 0.12.2, 0.13.0, 0.13.1, 0.13.2, 0.13.3, 0.13.4, 0.14.0, 0.14.1, 0.14.2, 0.14.3, 0.14.4, 0.14.5, 0.14.6, 0.15.0, 0.16.0, 0.16.1, 0.17.0, 0.17.1, 0.17.2, 0.17.3, 0.17.4, 19.0.0, 19.1.0, 19.1.1, 19.2.0, 19.2.1, 19.3.0, 19.4.0, 19.4.1, 19.4.2, 19.4.3, 19.4.4, 19.4.5, 19.5.0, 19.6.0, 19.7.0, 19.7.1, 19.8.0, 19.8.1, 19.9.0, 19.10.0, 20.0.0, 20.0.1, 20.0.2, 20.0.3, 20.0.4, 20.1.0, 21.0.0, 21.0.1, 21.1.0, 21.2.0
All unaffected versions: 22.0.0, 23.0.0