CWE
444
Advisory Published
Updated

CVE-2021-23336

First published: Sat Feb 13 2021(Updated: )

Python CPython could allow a remote attacker to bypass security restrictions, caused by a web cache poisoning flaw via urllib.parse.parse_qsl and urllib.parse.parse_qs. By sending a specially-crafted request parameter cloaking, an attacker could exploit this vulnerability to cause a difference in the interpretation of the request between the proxy and the server.

Credit: report@snyk.io report@snyk.io

Affected SoftwareAffected VersionHow to fix
IBM Cloud Pak for Security (CP4S)<=1.7.2.0
IBM Cloud Pak for Security (CP4S)<=1.7.1.0
IBM Cloud Pak for Security (CP4S)<=1.7.0.0
Python Python<3.6.13
Python Python>=3.7.0<3.7.10
Python Python>=3.8.0<3.8.8
Python Python>=3.9.0<3.9.2
Fedoraproject Fedora=32
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Debian Debian Linux=9.0
Netapp Cloud Backup
Netapp Inventory Collect Tool
NetApp ONTAP Select Deploy administration utility
Netapp Snapcenter
Djangoproject Django>=2.2<2.2.19
Djangoproject Django>=3.0<3.0.13
Djangoproject Django>=3.1<3.1.7
Oracle Communications Offline Mediation Controller=12.0.0.3.0
Oracle Communications Pricing Design Center=12.0.0.3.0
Oracle Enterprise Manager Ops Center=12.4.0.0
Oracle ZFS Storage Appliance=8.8
redhat/python3<0:3.6.8-37.el8
0:3.6.8-37.el8
redhat/python27-babel<0:0.9.6-10.el7
0:0.9.6-10.el7
redhat/python27-python<0:2.7.18-3.el7
0:2.7.18-3.el7
redhat/python27-python-jinja2<0:2.6-16.el7
0:2.6-16.el7
redhat/python27-python-pygments<0:1.5-5.el7
0:1.5-5.el7
redhat/rh-python38-babel<0:2.7.0-12.el7
0:2.7.0-12.el7
redhat/rh-python38-python<0:3.8.11-2.el7
0:3.8.11-2.el7
redhat/rh-python38-python-cryptography<0:2.8-5.el7
0:2.8-5.el7
redhat/rh-python38-python-jinja2<0:2.10.3-6.el7
0:2.10.3-6.el7
redhat/rh-python38-python-lxml<0:4.4.1-7.el7
0:4.4.1-7.el7
redhat/rh-python38-python-pip<0:19.3.1-2.el7
0:19.3.1-2.el7
redhat/rh-python38-python-urllib3<0:1.25.7-7.el7
0:1.25.7-7.el7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2021-23336?

    CVE-2021-23336 is a vulnerability in the Python CPython package that could allow a remote attacker to bypass security restrictions caused by a web cache poisoning.

  • How does CVE-2021-23336 work?

    CVE-2021-23336 allows an attacker to perform Web Cache Poisoning by using a vector called parameter cloaking, specifically targeting the functions urllib.parse.parse_qsl and urllib.parse.parse_qs.

  • What is the severity of CVE-2021-23336?

    CVE-2021-23336 has a severity level of medium with a score of 5.9.

  • Which versions of Python are affected by CVE-2021-23336?

    The versions of python/cpython affected by CVE-2021-23336 are 0 and before 3.6.13, 3.7.0 and before 3.7.10, 3.8.0 and before 3.8.8, and 3.9.0 and before 3.9.2.

  • How can I fix CVE-2021-23336?

    To fix CVE-2021-23336, update your Python package to version 3.6.13, 3.7.10, 3.8.8, or 3.9.2.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203