eventlet@0.25.1 vulnerabilities

Highly concurrent networking library

Direct Vulnerabilities

Known vulnerabilities in the eventlet package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
HTTP Header Injection

eventlet is a Highly concurrent networking library

Affected versions of this package are vulnerable to HTTP Header Injection via HTTP header processing within the WSGI implementation, allowing the usage of _ in the headers.

By exploiting this vulnerability attackers could craft specially formatted headers, potentially causing header name collisions or overwriting important headers in the WSGI environment.

How to fix HTTP Header Injection?

Upgrade eventlet to version 0.37.0 or higher.

[,0.37.0)
  • M
HTTP Request Smuggling

eventlet is a Highly concurrent networking library

Affected versions of this package are vulnerable to HTTP Request Smuggling due to accepting requests that include both content-length and transfer-encoding headers simultaneously, a practice that violates the RFC and could pose security risks.

Note:

The reject_bad_request option that was included in the fix, if disabled, allows these requests for compatibility with older servers that cannot be updated.

How to fix HTTP Request Smuggling?

Upgrade eventlet to version 0.34.3 or higher.

[,0.34.3)
  • M
Denial of Service (DoS)

eventlet is a Highly concurrent networking library

Affected versions of this package are vulnerable to Denial of Service (DoS). This can happen due to improper handling of highly compressed data frames and large websocket frames, that may cause memory exhaustion.

How to fix Denial of Service (DoS)?

Upgrade eventlet to version 0.31.0 or higher.

[0.10.0,0.31.0)