First published: Thu Dec 12 2024(Updated: )
There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next | >=1.7.0<=1.9.2 | |
F5 BIG-IP Next | >=1.1.0<=1.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000148969 is classified as low.
To fix F5-K000148969, update your affected F5 software to a version that addresses the vulnerability.
F5-K000148969 affects F5 BIG-IP Next Service Proxy versions from 1.7.0 to 1.9.2 and BIG-IP Next Cloud-Native Network Functions versions from 1.1.0 to 1.3.3.
F5-K000148969 involves the 'http.cookies' standard library module within CPython.
Yes, F5-K000148969 can result in excess CPU resource consumption due to the quadratic complexity of the cookie parsing algorithm.