Source: gunicorn
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for gunicorn.

CVE-2024-6827[0]:
| Gunicorn version 21.2.0 does not properly validate the value of the
| 'Transfer-Encoding' header as specified in the RFC standards, which
| leads to the default fallback method of 'Content-Length,' making it
| vulnerable to TE.CL request smuggling. This vulnerability can lead
| to cache poisoning, data exposure, session manipulation, SSRF, XSS,
| DoS, data integrity compromise, security bypass, information
| leakage, and business logic abuse.

https://huntr.com/bounties/1b4f8f38-39da-44b6-9f98-f618639d0dd7


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6827
    https://www.cve.org/CVERecord?id=CVE-2024-6827

Please adjust the affected versions in the BTS as needed.

Reply via email to