Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Apr 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat discovery |
|
| CPEs | cpe:/o:redhat:discovery:1.0::el9 | |
| Vendors & Products |
Redhat
Redhat discovery |
Sat, 22 Mar 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse. | |
| Title | HTTP Request Smuggling in benoitc/gunicorn | |
| Weaknesses | CWE-444 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:55.725Z
Updated: 2025-10-15T12:50:33.638Z
Reserved: 2024-07-16T23:32:47.872Z
Link: CVE-2024-6827
Updated: 2025-03-20T17:52:38.879Z
Status : Received
Published: 2025-03-20T10:15:33.357
Modified: 2025-03-20T10:15:33.357
Link: CVE-2024-6827