Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.
History

Wed, 09 Apr 2025 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat discovery
CPEs cpe:/o:redhat:discovery:1.0::el9
Vendors & Products Redhat
Redhat discovery

Sat, 22 Mar 2025 13:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.
Title HTTP Request Smuggling in benoitc/gunicorn
Weaknesses CWE-444
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:09:55.725Z

Updated: 2025-03-20T18:32:51.799Z

Reserved: 2024-07-16T23:32:47.872Z

Link: CVE-2024-6827

cve-icon Vulnrichment

Updated: 2025-03-20T17:52:38.879Z

cve-icon NVD

Status : Received

Published: 2025-03-20T10:15:33.357

Modified: 2025-03-20T10:15:33.357

Link: CVE-2024-6827

cve-icon Redhat

Severity : Important

Publid Date: 2025-03-20T10:09:55Z

Links: CVE-2024-6827 - Bugzilla