First published: Fri Feb 17 2023(Updated: )
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | <3.7.17 | |
Python Python | >=3.8.0<3.8.17 | |
Python Python | >=3.9.0<3.9.17 | |
Python Python | >=3.10.0<3.10.12 | |
Python Python | >=3.11.0<3.11.4 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Management Services For Element Software | ||
Netapp Management Services For Netapp Hci | ||
NetApp ONTAP Select Deploy administration utility | ||
IBM QRadar SIEM | <=7.5 - 7.5.0 UP7 | |
redhat/python | <3.11 | 3.11 |
debian/pypy3 | <=7.3.5+dfsg-2+deb11u2 | 7.3.5+dfsg-2+deb11u3 7.3.11+dfsg-2+deb12u2 7.3.17+dfsg-2 |
debian/python2.7 | 2.7.18-8+deb11u1 | |
debian/python3.11 | 3.11.2-6+deb12u4 3.11.2-6+deb12u3 | |
debian/python3.9 | <=3.9.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24329 is an issue in the urllib.parse component of Python before version 3.11.4 that allows attackers to bypass blocklisting methods.
CVE-2023-24329 has a severity rating of high (7).
CVE-2023-24329 affects Python versions up to but excluding 3.11.4.
To fix the vulnerability, users should update their Python installation to version 3.11.4 or later.
More information about CVE-2023-24329 can be found at the following references: [link1](https://pointernull.com/security/python-url-parse-problem.html), [link2](https://github.com/python/cpython/pull/99421), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2174012).