Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork33.7k
Closed
Description
Everyone (including thesubmitter of the now public exploit who submitted the issue half a year ago tosecurity@python.org and theNVD) seems to think that#99421 "accidently fixed"CVE-2023-24329.
Did the Python Security Response Team verify that this vulnerability that was reported to them and that is now public was fixed by#99421?
The PoC from the submitter still works for me with the Debian package 3.11.2-4, which surprised me and makes me wonder whether the fix had any effect at all on the stripping of leading blanks issue in the CVE.
Linked PRs
- gh-102153: fix CVE-2023-24329 #102470
- gh-102153: Start stripping C0 control and space chars in
urlsplit#102508 - [3.11] gh-102153: Start stripping C0 control and space chars in
urlsplit(GH-102508) #104575 - [3.10] [3.11] gh-102153: Start stripping C0 control and space chars in
urlsplit(GH-102508) (GH-104575) #104592 - [3.9] gh-102153: Start stripping C0 control and space chars in
urlsplit(GH-102508) (GH-104575) (GH-104592) #104593 - [3.8] gh-102153: Start stripping C0 control and space chars in
urlsplit(GH-102508) (GH-104575) (GH-104592) (#104593) #104895 - [3.7] gh-102153: Start stripping C0 control and space chars in
urlsplit(GH-102508) (GH-104575) (GH-104592) (#104593) #104896 - [3.8] gh-102153: Start stripping C0 control and space chars in `urlsp… #104918