Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Apr 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat discovery |
|
CPEs | cpe:/o:redhat:discovery:1.0::el9 | |
Vendors & Products |
Redhat
Redhat discovery |
Sat, 22 Mar 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse. | |
Title | HTTP Request Smuggling in benoitc/gunicorn | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:55.725Z
Updated: 2025-03-20T18:32:51.799Z
Reserved: 2024-07-16T23:32:47.872Z
Link: CVE-2024-6827

Updated: 2025-03-20T17:52:38.879Z

Status : Received
Published: 2025-03-20T10:15:33.357
Modified: 2025-03-20T10:15:33.357
Link: CVE-2024-6827
