-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency gunicorn to v21 #402
base: main
Are you sure you want to change the base?
Conversation
Updated dependencies detected. Learn more about Socket for GitHub ↗︎
|
@@ -1,6 +1,6 @@ | |||
connexion==2.14.2 | |||
flask==2.2.2 | |||
gunicorn==20.1.0 | |||
gunicorn==21.0.0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: Affected versions of gunicorn are vulnerable to Inconsistent Interpretation Of Http Requests ('Http Request/Response Smuggling'). The vulnerability in Gunicorn arises from its failure to properly validate Transfer-Encoding headers, potentially exposing it to HTTP Request Smuggling (HRS) attacks by mishandling requests with multiple Transfer-Encoding headers, leading to a CL-TE attack where both Content-Length and Transfer-Encoding headers confuse the server.
Manual Review Advice: A vulnerability from this advisory is reachable if you are using a gunicorn backend server in async mode
Fix: Upgrade this library to at least version 22.0.0 at vampi/requirements.txt:3.
Reference(s): GHSA-w3h3-4rj7-4ph4, CVE-2024-1135
Ignore this finding from ssc-0cfcd72f-a72f-48d0-9da1-71e9f3518e34
New Issues (4)Checkmarx found the following issues in this Pull Request
Fixed Issues (18)Great job! The following issues were fixed in this Pull Request |
379fd7a
to
731ad14
Compare
This PR contains the following updates:
==20.1.0
->==21.0.0
By merging this PR, the issue #355 will be automatically resolved and closed:
Release Notes
benoitc/gunicorn (gunicorn)
v21.0.0
Compare Source