HTTP Request Smuggling Affecting eventlet package, versions [,0.34.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-EVENTLET-6514873
  • published 1 Apr 2024
  • disclosed 1 Apr 2024
  • credit Keran Mu, Jianjun Chen

Introduced: 1 Apr 2024

CVE NOT AVAILABLE CWE-444 Open this link in a new tab

How to fix?

Upgrade eventlet to version 0.34.3 or higher.

Overview

eventlet is a Highly concurrent networking library

Affected versions of this package are vulnerable to HTTP Request Smuggling due to accepting requests that include both content-length and transfer-encoding headers simultaneously, a practice that violates the RFC and could pose security risks.

Note:

The reject_bad_request option that was included in the fix, if disabled, allows these requests for compatibility with older servers that cannot be updated.

PoC

curl -d "param1=value1&param2=value2" -X POST -H 'Transfer-Encoding:
chunked' -H 'Content-Length: 0' --http1.1 http://0.0.0.0:8090 -i

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    Low
  • Availability (A)
    None