First published: Fri Feb 17 2023(Updated: )
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <3.11 | 3.11 |
debian/pypy3 | <=7.3.5+dfsg-2+deb11u2 | 7.3.5+dfsg-2+deb11u4 7.3.11+dfsg-2+deb12u3 7.3.19+dfsg-1 |
debian/python2.7 | 2.7.18-8+deb11u1 | |
debian/python3.11 | 3.11.2-6+deb12u5 3.11.2-6+deb12u3 | |
debian/python3.9 | <=3.9.2-1 | 3.9.2-1+deb11u3 |
IBM Security QRadar | <=3.12 | |
Python 2.7 | <3.7.17 | |
Python 2.7 | >=3.8.0<3.8.17 | |
Python 2.7 | >=3.9.0<3.9.17 | |
Python 2.7 | >=3.10.0<3.10.12 | |
Python 2.7 | >=3.11.0<3.11.4 | |
Red Hat Fedora | =36 | |
Red Hat Fedora | =37 | |
Red Hat Fedora | =38 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
NetApp Active IQ Unified Manager | ||
NetApp Management Services for Element Software | ||
NetApp Management Services for NetApp HCI | ||
NetApp ONTAP Select Deploy | ||
F5 BIG-IP and BIG-IQ Centralized Management | =17.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.9 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 | |
F5 BIG-IP Next | =1.1.0 | |
F5 BIG-IP Next | >=1.5.0<=1.8.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.4.0 | |
F5 F5OS | >=1.5.0<=1.5.1=1.4.0>=1.3.0<=1.3.2 | 1.7.0 |
F5 F5OS | >=1.5.0<=1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24329 is an issue in the urllib.parse component of Python before version 3.11.4 that allows attackers to bypass blocklisting methods.
CVE-2023-24329 has a severity rating of high (7).
CVE-2023-24329 affects Python versions up to but excluding 3.11.4.
To fix the vulnerability, users should update their Python installation to version 3.11.4 or later.
More information about CVE-2023-24329 can be found at the following references: [link1](https://pointernull.com/security/python-url-parse-problem.html), [link2](https://github.com/python/cpython/pull/99421), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2174012).