← Volver a CVEs
CVE-2025-58068
CRITICAL9.1
Descripcion
Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.
Detalles CVE
Puntuacion CVSS v3.19.1
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado8/29/2025
Ultima modificacion11/3/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
eventlet:eventlet
Debilidades (CWE)
CWE-444
Referencias
https://github.com/eventlet/eventlet/commit/0bfebd1117d392559e25b4bfbfcc941754de88fb(security-advisories@github.com)
https://github.com/eventlet/eventlet/pull/1062(security-advisories@github.com)
https://github.com/eventlet/eventlet/security/advisories/GHSA-hw6f-rjfj-j7j7(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2025/09/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.