5.9

CVE-2021-23336

Exploit

The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PythonPython Version < 3.6.13
PythonPython Version >= 3.7.0 < 3.7.10
PythonPython Version >= 3.8.0 < 3.8.8
PythonPython Version >= 3.9.0 < 3.9.2
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
DebianDebian Linux Version9.0
NetappCloud Backup Version-
NetappSnapcenter Version-
DjangoprojectDjango Version >= 2.2 < 2.2.19
DjangoprojectDjango Version >= 3.0 < 3.0.13
DjangoprojectDjango Version >= 3.1 < 3.1.7
OracleZfs Storage Appliance Version8.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.3% 0.53
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.9 1.6 4.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
nvd@nist.gov 4 4.9 4.9
AV:N/AC:H/Au:N/C:N/I:P/A:P
report@snyk.io 5.9 1.6 4.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.

http://www.openwall.com/lists/oss-security/2021/02/19/4
Patch
Third Party Advisory
Mailing List