HTTP Request Smuggling Affecting gunicorn package, versions [,22.0.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-GUNICORN-6615672
- published 16 Apr 2024
- disclosed 16 Apr 2024
- credit Yadhu Krishna M
Introduced: 16 Apr 2024
CVE-2024-1135 Open this link in a new tabHow to fix?
Upgrade gunicorn
to version 22.0.0 or higher.
Overview
gunicorn is a Python WSGI HTTP Server for UNIX
Affected versions of this package are vulnerable to HTTP Request Smuggling due to the improper validation of Transfer-Encoding
headers. An attacker can bypass security restrictions and access restricted endpoints by crafting requests with conflicting Transfer-Encoding
headers.
Notes:
This is only exploitable if users have a network path which does not filter out invalid requests;
Users are advised to block access to restricted endpoints via a firewall or other mechanism until a fix can be developed.
This issue arises from the application's incorrectly processing of requests with multiple, conflicting
Transfer-Encoding
headers, treating them as chunked regardless of the final encoding specified.