Improper Validation of Specified Type of Input Affecting python3-libs package, versions *
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-PYTHON3LIBS-8380859
- published 14 Nov 2024
- disclosed 12 Nov 2024
Introduced: 12 Nov 2024
New CVE-2024-11168 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
python3-libs
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3-libs
package and not the python3-libs
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts ([]
), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
References
- https://access.redhat.com/security/cve/CVE-2024-11168
- https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
- https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
- https://github.com/python/cpython/issues/103848
- https://github.com/python/cpython/pull/103849
- https://mail.python.org/archives/list/security-announce@python.org/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
CVSS Scores
version 3.1