First published: Sat Feb 13 2021(Updated: )
Python CPython could allow a remote attacker to bypass security restrictions, caused by a web cache poisoning flaw via urllib.parse.parse_qsl and urllib.parse.parse_qs. By sending a specially-crafted request parameter cloaking, an attacker could exploit this vulnerability to cause a difference in the interpretation of the request between the proxy and the server.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
Python Python | <3.6.13 | |
Python Python | >=3.7.0<3.7.10 | |
Python Python | >=3.8.0<3.8.8 | |
Python Python | >=3.9.0<3.9.2 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Netapp Cloud Backup | ||
Netapp Inventory Collect Tool | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Snapcenter | ||
Djangoproject Django | >=2.2<2.2.19 | |
Djangoproject Django | >=3.0<3.0.13 | |
Djangoproject Django | >=3.1<3.1.7 | |
Oracle Communications Offline Mediation Controller | =12.0.0.3.0 | |
Oracle Communications Pricing Design Center | =12.0.0.3.0 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle ZFS Storage Appliance | =8.8 | |
redhat/python3 | <0:3.6.8-37.el8 | 0:3.6.8-37.el8 |
redhat/python27-babel | <0:0.9.6-10.el7 | 0:0.9.6-10.el7 |
redhat/python27-python | <0:2.7.18-3.el7 | 0:2.7.18-3.el7 |
redhat/python27-python-jinja2 | <0:2.6-16.el7 | 0:2.6-16.el7 |
redhat/python27-python-pygments | <0:1.5-5.el7 | 0:1.5-5.el7 |
redhat/rh-python38-babel | <0:2.7.0-12.el7 | 0:2.7.0-12.el7 |
redhat/rh-python38-python | <0:3.8.11-2.el7 | 0:3.8.11-2.el7 |
redhat/rh-python38-python-cryptography | <0:2.8-5.el7 | 0:2.8-5.el7 |
redhat/rh-python38-python-jinja2 | <0:2.10.3-6.el7 | 0:2.10.3-6.el7 |
redhat/rh-python38-python-lxml | <0:4.4.1-7.el7 | 0:4.4.1-7.el7 |
redhat/rh-python38-python-pip | <0:19.3.1-2.el7 | 0:19.3.1-2.el7 |
redhat/rh-python38-python-urllib3 | <0:1.25.7-7.el7 | 0:1.25.7-7.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-23336 is a vulnerability in the Python CPython package that could allow a remote attacker to bypass security restrictions caused by a web cache poisoning.
CVE-2021-23336 allows an attacker to perform Web Cache Poisoning by using a vector called parameter cloaking, specifically targeting the functions urllib.parse.parse_qsl and urllib.parse.parse_qs.
CVE-2021-23336 has a severity level of medium with a score of 5.9.
The versions of python/cpython affected by CVE-2021-23336 are 0 and before 3.6.13, 3.7.0 and before 3.7.10, 3.8.0 and before 3.8.8, and 3.9.0 and before 3.9.2.
To fix CVE-2021-23336, update your Python package to version 3.6.13, 3.7.10, 3.8.8, or 3.9.2.