Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
References
| Link | Resource |
|---|---|
| http://encode.com | Vendor Advisory |
| https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 | Exploit Third Party Advisory |
| https://github.com/encode/httpx | Product Third Party Advisory |
| https://github.com/encode/httpx/discussions/1831 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/encode/httpx/issues/2184 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/encode/httpx/releases/tag/0.23.0 | Release Notes Third Party Advisory |
| http://encode.com | Vendor Advisory |
| https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 | Exploit Third Party Advisory |
| https://github.com/encode/httpx | Product Third Party Advisory |
| https://github.com/encode/httpx/discussions/1831 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/encode/httpx/issues/2184 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/encode/httpx/releases/tag/0.23.0 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 06:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://encode.com - Vendor Advisory | |
| References | () https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 - Exploit, Third Party Advisory | |
| References | () https://github.com/encode/httpx - Product, Third Party Advisory | |
| References | () https://github.com/encode/httpx/discussions/1831 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/encode/httpx/issues/2184 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/encode/httpx/releases/tag/0.23.0 - Release Notes, Third Party Advisory |
12 Oct 2022, 02:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | ||
| References | (MISC) https://github.com/encode/httpx/releases/tag/0.23.0 - Release Notes, Third Party Advisory |
23 May 2022, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`. |
09 May 2022, 12:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://github.com/encode/httpx/discussions/1831 - Exploit, Issue Tracking, Third Party Advisory | |
| References | (MISC) https://github.com/encode/httpx - Product, Third Party Advisory | |
| References | (MISC) http://encode.com - Vendor Advisory | |
| References | (MISC) https://github.com/encode/httpx/issues/2184 - Exploit, Issue Tracking, Third Party Advisory | |
| References | (MISC) https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:encode:httpx:*:*:*:*:*:python:*:* cpe:2.3:a:encode:httpx:1.0.0:beta0:*:*:*:python:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
| CWE | CWE-20 |
28 Apr 2022, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`. |
28 Apr 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-04-28 14:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41945
Mitre link : CVE-2021-41945
CVE.ORG link : CVE-2021-41945
JSON object : View
Products Affected
encode
- httpx
CWE
CWE-20
Improper Input Validation
