[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-23336Date: (C)2021-02-17   (M)2024-04-25


The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.9CVSS Score : 4.0
Exploit Score: 1.6Exploit Score: 4.9
Impact Score: 4.2Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: HIGH
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: NONE
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: NONEAvailability: PARTIAL
Integrity: LOW 
Availability: HIGH 
  
Reference:
FEDORA-2021-12df7f7382
FEDORA-2021-1bb399a5af
FEDORA-2021-2897f5366c
FEDORA-2021-309bc2e727
FEDORA-2021-3352c1c802
FEDORA-2021-5a09621ebb
FEDORA-2021-7547ad987f
FEDORA-2021-7c1bb32d13
FEDORA-2021-7d3a9004e2
FEDORA-2021-907f3bacae
FEDORA-2021-98720f3785
FEDORA-2021-b1843407ca
FEDORA-2021-b326fcb83f
FEDORA-2021-b6b6093b3a
FEDORA-2021-b76ede8f4d
FEDORA-2021-e22bb0e548
FEDORA-2021-e525e48886
FEDORA-2021-ef83e8525a
FEDORA-2021-f4fd9372c7
GLSA-202104-04
N/A
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://github.com/python/cpython/pull/24297
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:python:python
cpe:/a:djangoproject:django
CWE    1
CWE-444
OVAL    49
oval:org.secpod.oval:def:89044059
oval:org.secpod.oval:def:89044050
oval:org.secpod.oval:def:89044075
oval:org.secpod.oval:def:89044077
...

© SecPod Technologies