First published: Thu Apr 28 2022(Updated: )
Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/httpx | <0.23.0 | 0.23.0 |
Encode Httpx | <0.23.0 | |
<0.23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41945 is a vulnerability affecting Encode OSS httpx version 0.23.0 and below, where improper input validation in `httpx.URL`, `httpx.Client`, and some functions using `httpx.URL.copy_with` can lead to security issues.
CVE-2021-41945 has a severity rating of 9.1 (Critical).
The affected software versions include Encode OSS httpx version 0.23.0 and below, as well as Encode Httpx version up to exclusive 0.23.0.
To fix the CVE-2021-41945 vulnerability, update the httpx package to version 0.23.0 or higher.
You can find more information about CVE-2021-41945 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-41945), [GitHub Issue](https://github.com/encode/httpx/issues/2184), [Gist](https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571).