CVE-2021-41945: Improper Input Validation in httpx
(updated )
Encode OSS httpx < 0.23.0 is affected by improper input validation in httpx.URL
, httpx.Client
and some functions using httpx.URL.copy_with
.
References
- gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571
- github.com/advisories/GHSA-h8pj-cxx2-jfg2
- github.com/encode/httpx
- github.com/encode/httpx/commit/e9b0c85dd4f4e4469c57c4b38e5101fd12081b5c
- github.com/encode/httpx/discussions/1831
- github.com/encode/httpx/issues/2184
- github.com/encode/httpx/pull/2185
- github.com/encode/httpx/pull/2185/commits/e3c495a32c63d8aa7f1bcf3b7b27ee1a0ff428e1
- github.com/encode/httpx/releases/tag/0.23.0
- github.com/pypa/advisory-database/tree/main/vulns/httpx/PYSEC-2022-183.yaml
- nvd.nist.gov/vuln/detail/CVE-2021-41945
Detect and mitigate CVE-2021-41945 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →