Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') Affecting gevent package, versions [,23.9.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-GEVENT-5906371
- published 20 Sep 2023
- disclosed 20 Sep 2023
- credit mukeran, Jianjun Chen
Introduced: 20 Sep 2023
CVE-2023-41419 Open this link in a new tabHow to fix?
Upgrade gevent
to version 23.9.0 or higher.
Overview
Affected versions of this package are vulnerable to Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') when the gevent.pywsgi
function is used. An attacker can craft invalid trailers in chunked requests on keep-alive connections that might appear as two requests to gevent.pywsgi
. This could potentially bypass checks if an upstream server is filtering incoming requests based on paths or header fields and simply passing trailers through without validating them.
Note: If the upstream server validated that the trailers meet the HTTP specification, this could not occur, because characters that are required in an HTTP request, like a space, are not allowed in trailers.