Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade eventlet to version 0.34.3 or higher.
eventlet is a Highly concurrent networking library
Affected versions of this package are vulnerable to HTTP Request Smuggling due to accepting requests that include both content-length and transfer-encoding headers simultaneously, a practice that violates the RFC and could pose security risks.
Note:
The reject_bad_request option that was included in the fix, if disabled, allows these requests for compatibility with older servers that cannot be updated.
curl -d "param1=value1¶m2=value2" -X POST -H 'Transfer-Encoding:
chunked' -H 'Content-Length: 0' --http1.1 http://0.0.0.0:8090 -i