← Voltar para CVEs
CVE-2025-58068
CRITICAL9.1
Descricao
Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.
Detalhes CVE
Pontuacao CVSS v3.19.1
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado8/29/2025
Ultima modificacao11/3/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
eventlet:eventlet
Fraquezas (CWE)
CWE-444
Referencias
https://github.com/eventlet/eventlet/commit/0bfebd1117d392559e25b4bfbfcc941754de88fb(security-advisories@github.com)
https://github.com/eventlet/eventlet/pull/1062(security-advisories@github.com)
https://github.com/eventlet/eventlet/security/advisories/GHSA-hw6f-rjfj-j7j7(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2025/09/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.