CVE-2024-1135

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1135
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1135.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-1135
Aliases
Related
Published
2024-04-16T00:15:07Z
Modified
2024-09-11T06:13:19.714630Z
Summary
[none]
Details

Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability allows for a range of attacks including cache poisoning, session manipulation, and data exposure.

References

Affected packages

Debian:11 / gunicorn

Package

Name
gunicorn
Purl
pkg:deb/debian/gunicorn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*

20.1.0-1
20.1.0-2
20.1.0-3
20.1.0-4
20.1.0-5
20.1.0-6

22.*

22.0.0-1

23.*

23.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / gunicorn

Package

Name
gunicorn
Purl
pkg:deb/debian/gunicorn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*

20.1.0-6

22.*

22.0.0-1

23.*

23.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / gunicorn

Package

Name
gunicorn
Purl
pkg:deb/debian/gunicorn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
22.0.0-1

Affected versions

20.*

20.1.0-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}