CVE-2020-7658: meinheld vulnerable to HTTP Request Smuggling
(updated )
meinheld prior to 1.0.2 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing.
References
- github.com/advisories/GHSA-63h2-9cc8-fc7m
- github.com/mopemope/meinheld
- github.com/mopemope/meinheld/blob/master/CHANGES.rst
- github.com/mopemope/meinheld/commit/0cfa70b2cd3800f1e4beeaef5421b156d90f0e09
- github.com/mopemope/meinheld/commit/3bc3e7ccd534277af955c0c92981d0aa033929a7
- github.com/mopemope/meinheld/commit/4155876bfd3e8fc4adad4aaa59ec3f1cefa1d2d1
- github.com/mopemope/meinheld/issues/111
- github.com/pypa/advisory-database/tree/main/vulns/meinheld/PYSEC-2020-239.yaml
- nvd.nist.gov/vuln/detail/CVE-2020-7658
- snyk.io/vuln/SNYK-PYTHON-MEINHELD-569140
Detect and mitigate CVE-2020-7658 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →