5.9
CVE-2021-23336
- EPSS 0.3%
- Published 15.02.2021 13:15:12
- Last modified 21.11.2024 05:51:31
- Source report@snyk.io
- Teams watchlist Login
- Open Login
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
Data is provided by the National Vulnerability Database (NVD)
Fedoraproject ≫ Fedora Version32
Fedoraproject ≫ Fedora Version33
Fedoraproject ≫ Fedora Version34
Debian ≫ Debian Linux Version9.0
Netapp ≫ Cloud Backup Version-
Netapp ≫ Inventory Collect Tool Version-
Netapp ≫ Ontap Select Deploy Administration Utility Version-
Netapp ≫ Snapcenter Version-
Djangoproject ≫ Django Version >= 2.2 < 2.2.19
Djangoproject ≫ Django Version >= 3.0 < 3.0.13
Djangoproject ≫ Django Version >= 3.1 < 3.1.7
Oracle ≫ Communications Offline Mediation Controller Version12.0.0.3.0
Oracle ≫ Communications Pricing Design Center Version12.0.0.3.0
Oracle ≫ Enterprise Manager Ops Center Version12.4.0.0
Oracle ≫ Zfs Storage Appliance Version8.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.3% | 0.53 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.9 | 1.6 | 4.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
|
nvd@nist.gov | 4 | 4.9 | 4.9 |
AV:N/AC:H/Au:N/C:N/I:P/A:P
|
report@snyk.io | 5.9 | 1.6 | 4.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
|
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.