HTTP Request Smuggling Affecting gunicorn package, versions [,19.10.0)[20.0.0,20.0.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-GUNICORN-541164
  • published9 Jan 2020
  • disclosed15 Nov 2019
  • creditAustin Jones

Introduced: 15 Nov 2019

CVE NOT AVAILABLE CWE-444  (opens in a new tab)

How to fix?

Upgrade gunicorn to version 19.10.0, 20.0.1 or higher.

Overview

gunicorn is a Python WSGI HTTP Server for UNIX

Affected versions of this package are vulnerable to HTTP Request Smuggling. It fails to properly process the Transfer-Encoding and Content-Length headers when both are present in a package request. This allows for conflicting information to be sent regarding the length of the package, which when processed by back-end servers under certain configurations would allow for malicious users to bypass security controls, gain unauthorized access to sensitive data, and directly compromise other application users.

CVSS Base Scores

version 3.1