CVE-2023-24329 — Improper Input Validation in Python
Severity
7.5HIGHNVD
OSV7.6
EPSS
1.4%
top 19.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 17
Latest updateDec 25
Description
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages13 packages
Also affects: Fedora 36, 37, 38
Patches
🔴Vulnerability Details
6OSV▶
python3.5, python3.6, python3.7, python3.8, python3.9, python3.10, python3.11, python3.12 vulnerabilities↗2024-07-11
📋Vendor Advisories
12Oracle▶
Oracle Oracle Communications Risk Matrix: Install/Upgrade (JetBrains Kotlin) — CVE-2022-24329↗2023-10-15
📄Research Papers
2💬Community
1HackerOne▶
Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities.↗2024-05-08