Safety vulnerability ID: 53376
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Python 3.7.17, 3.8.17, 3.9.17, 3.10.12 and 3.11.4 include a fix for CVE-2023-24329: An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
https://github.com/python/cpython/issues/102153
https://pointernull.com/security/python-url-parse-problem.html
Latest version: 0.9.8
An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. See CVE-2023-24329.
MISC:https://github.com/python/cpython/pull/99421: https://github.com/python/cpython/pull/99421
MISC:https://pointernull.com/security/python-url-parse-problem.html: https://pointernull.com/security/python-url-parse-problem.html
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application