#VU107611 Inconsistent interpretation of HTTP requests in Gunicorn - CVE-2024-6827

 

#VU107611 Inconsistent interpretation of HTTP requests in Gunicorn - CVE-2024-6827

Published: April 18, 2025


Vulnerability identifier: #VU107611
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2024-6827
CWE-ID: CWE-444
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Gunicorn
Software vendor:
Gunicorn

Description

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to Gunicorn does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. A remote attacker can send a specially crafted HTTP request to the server and initiate cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.


Remediation

Install updates from vendor's website.

External links