Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
References
Link | Resource |
---|---|
http://encode.com | Vendor Advisory |
https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 | Exploit Third Party Advisory |
https://github.com/encode/httpx | Product Third Party Advisory |
https://github.com/encode/httpx/discussions/1831 | Exploit Issue Tracking Third Party Advisory |
https://github.com/encode/httpx/issues/2184 | Exploit Issue Tracking Third Party Advisory |
https://github.com/encode/httpx/releases/tag/0.23.0 | Release Notes Third Party Advisory |
http://encode.com | Vendor Advisory |
https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 | Exploit Third Party Advisory |
https://github.com/encode/httpx | Product Third Party Advisory |
https://github.com/encode/httpx/discussions/1831 | Exploit Issue Tracking Third Party Advisory |
https://github.com/encode/httpx/issues/2184 | Exploit Issue Tracking Third Party Advisory |
https://github.com/encode/httpx/releases/tag/0.23.0 | Release Notes Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-04-28 14:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41945
Mitre link : CVE-2021-41945
CVE.ORG link : CVE-2021-41945
JSON object : View
Products Affected
encode
- httpx
CWE
CWE-20
Improper Input Validation