eventlet@0.11.0 vulnerabilities

Highly concurrent networking library

  • latest version

    0.40.4

  • latest non vulnerable version

  • first published

    17 years ago

  • latest version published

    17 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the eventlet package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    HTTP Request Smuggling

    eventlet is a Highly concurrent networking library

    Affected versions of this package are vulnerable to HTTP Request Smuggling via improper handling of HTTP trailer sections in the wsgi parser. An attacker can bypass front-end security controls, launch targeted attacks against active site users, and poison web caches by sending specially crafted HTTP requests.

    How to fix HTTP Request Smuggling?

    Upgrade eventlet to version 0.40.3 or higher.

    [,0.40.3)
    • M
    HTTP Header Injection

    eventlet is a Highly concurrent networking library

    Affected versions of this package are vulnerable to HTTP Header Injection via HTTP header processing within the WSGI implementation, allowing the usage of _ in the headers.

    By exploiting this vulnerability attackers could craft specially formatted headers, potentially causing header name collisions or overwriting important headers in the WSGI environment.

    How to fix HTTP Header Injection?

    Upgrade eventlet to version 0.37.0 or higher.

    [,0.37.0)
    • M
    HTTP Request Smuggling

    eventlet is a Highly concurrent networking library

    Affected versions of this package are vulnerable to HTTP Request Smuggling due to accepting requests that include both content-length and transfer-encoding headers simultaneously, a practice that violates the RFC and could pose security risks.

    Note:

    The reject_bad_request option that was included in the fix, if disabled, allows these requests for compatibility with older servers that cannot be updated.

    How to fix HTTP Request Smuggling?

    Upgrade eventlet to version 0.34.3 or higher.

    [,0.34.3)
    • M
    Denial of Service (DoS)

    eventlet is a Highly concurrent networking library

    Affected versions of this package are vulnerable to Denial of Service (DoS). This can happen due to improper handling of highly compressed data frames and large websocket frames, that may cause memory exhaustion.

    How to fix Denial of Service (DoS)?

    Upgrade eventlet to version 0.31.0 or higher.

    [0.10.0,0.31.0)