Python-Gunicorn Security Advisory: Addressing HTTP Smuggling Vulnerabilities in Mageia 2024-0236
Summary
Gunicorn fails to properly validate Transfer-Encoding headers, leading
to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests
with conflicting Transfer-Encoding headers, attackers can bypass
security restrictions and access restricted endpoints. This issue is due
to Gunicorn's handling of Transfer-Encoding headers, where it
incorrectly processes requests with multiple, conflicting
Transfer-Encoding headers, treating them as chunked regardless of the
final encoding specified. This vulnerability allows for a range of
attacks including cache poisoning, session manipulation, and data
exposure.
References
- https://bugs.mageia.org/show_bug.cgi?id=33146
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T3JUAVTE5DCLOJLFBSIK3OPDOUIF7BMB/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1135
Resolution
MGASA-2024-0236 - Updated python-gunicorn packages fix security vulnerability
SRPMS
- 9/core/python-gunicorn-22.0.0-1.mga9