Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency gunicorn to v21 #402

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

mend-for-jackfan.us.kg[bot]
Copy link
Contributor

This PR contains the following updates:

Package Update Change
gunicorn (changelog) major ==20.1.0 -> ==21.0.0

By merging this PR, the issue #355 will be automatically resolved and closed:

Severity CVSS Score CVE
High High 7.4 CVE-2024-1135
High High 7.0 CVE-2024-6345

Release Notes

benoitc/gunicorn (gunicorn)

v21.0.0

Compare Source


  • If you want to rebase/retry this PR, check this box

@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot added the security fix Security fix generated by Mend label Feb 12, 2025
Copy link

socket-security bot commented Feb 12, 2025

Updated dependencies detected. Learn more about Socket for GitHub ↗︎

Package New capabilities Transitives Size Publisher
pypi/[email protected]21.0.0 Transitive: environment, eval, filesystem, network, shell, unsafe +257 2.02 GB benoitc, tilgovi

View full report↗︎

@@ -1,6 +1,6 @@
connexion==2.14.2
flask==2.2.2
gunicorn==20.1.0
gunicorn==21.0.0
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: Affected versions of gunicorn are vulnerable to Inconsistent Interpretation Of Http Requests ('Http Request/Response Smuggling'). The vulnerability in Gunicorn arises from its failure to properly validate Transfer-Encoding headers, potentially exposing it to HTTP Request Smuggling (HRS) attacks by mishandling requests with multiple Transfer-Encoding headers, leading to a CL-TE attack where both Content-Length and Transfer-Encoding headers confuse the server.

Manual Review Advice: A vulnerability from this advisory is reachable if you are using a gunicorn backend server in async mode

Fix: Upgrade this library to at least version 22.0.0 at vampi/requirements.txt:3.

Reference(s): GHSA-w3h3-4rj7-4ph4, CVE-2024-1135

Ignore this finding from ssc-0cfcd72f-a72f-48d0-9da1-71e9f3518e34

@rafikmojr
Copy link
Contributor

rafikmojr commented Feb 12, 2025

Logo
Checkmarx One – Scan Summary & Details1fbdd382-ab07-483e-9f99-230fd8b44b43

New Issues (4)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2024-1135 Python-gunicorn-21.0.0
detailsRecommended version: 22.0.0
Description: Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with c...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
HIGH CVE-2024-34069 Python-Werkzeug-2.2.3
detailsRecommended version: 3.0.6
Description: Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions prior to 3.0.3 of Werkzeug can allow an attacker to exe...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
HIGH CVE-2024-49767 Python-Werkzeug-2.2.3
detailsRecommended version: 3.0.6
Description: Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a ver...
Attack Vector: NETWORK
Attack Complexity: LOW
Vulnerable Package
LOW CVE-2024-49766 Python-Werkzeug-2.2.3
detailsRecommended version: 3.0.6
Description: Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, "os.path.isabs()" does not catch UNC paths like "/...
Attack Vector: NETWORK
Attack Complexity: HIGH
Vulnerable Package
Fixed Issues (18)

Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
MEDIUM Host Namespace is Shared /docker-compose.yaml: 11
MEDIUM Host Namespace is Shared /docker-compose.yaml: 3
MEDIUM Networks Not Set /docker-compose.yaml: 3
MEDIUM Networks Not Set /docker-compose.yaml: 11
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34

@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot changed the title Update dependency gunicorn to v21 Update dependency gunicorn to v21 - autoclosed Mar 5, 2025
@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot deleted the whitesource-remediate/gunicorn-21.x branch March 5, 2025 00:01
@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot changed the title Update dependency gunicorn to v21 - autoclosed Update dependency gunicorn to v21 Mar 6, 2025
@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot force-pushed the whitesource-remediate/gunicorn-21.x branch from 379fd7a to 731ad14 Compare March 6, 2025 12:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security fix Security fix generated by Mend
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant