Name | CVE-2023-24329 |
Description | An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python3.11 (PTS) | sid, bookworm | 3.11.2-6 | vulnerable |
python3.7 (PTS) | buster | 3.7.3-2+deb10u3 | vulnerable |
buster (security) | 3.7.3-2+deb10u4 | vulnerable | |
python3.9 (PTS) | bullseye | 3.9.2-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python3.11 | source | (unstable) | (unfixed) | |||
python3.7 | source | (unstable) | (unfixed) | |||
python3.9 | source | (unstable) | (unfixed) |
[bullseye] - python3.9 <no-dsa> (Minor issue)
https://pointernull.com/security/python-url-parse-problem.html
https://github.com/python/cpython/pull/99421
https://github.com/python/cpython/pull/99446 (backport for 3.11 branch)
https://github.com/python/cpython/commit/439b9cfaf43080e91c4ad69f312f21fa098befc7 (v3.12.0a2)
https://github.com/python/cpython/commit/72d356e3584ebfb8e813a8e9f2cd3dccf233c0d9 (v3.11.1)
The change linked above does not seem to fix the CVE:
https://github.com/python/cpython/issues/102153