Version 23.0.0
gunicorn
gunicorn 'Green Unicorn' is a WSGI HTTP Server for UNIX, fast clients and sleepy applications.
Install Instructions
pip install gunicorn
Current Version Release Date August 10, 2024
Language Python
Package URL (purl) pkg:pip/gunicorn@23.0.0
Find gunicorn
vulnerabilities in your supply chain.
gunicorn Vulnerabilities
Sort by
CVE (Latest)
CVE | CVSS Score | CWE(s) | EPSS Score | EPSS % | Impacted Versions |
---|---|---|---|---|---|
CVE-2018-1000164 | High 7.5 | CWE-93 | 0.00491 | 0.76794 |
|
CVE-2024-1135 | High 7.5 | CWE-444 | 0.00043 | 0.10302 |
|
gunicorn Vulnerability Remediation Guidance
CVE | Description | Full list of Impacted Versions | Fix |
---|---|---|---|
CVE-2024-1135 | Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability allows for a range of attacks including cache poisoning, session manipulation, and data exposure. | 19.2.0, 20.0.2, 21.2.0, 21.0.1, 19.4.3, 19.8.1, 20.0.1, 19.5.0 (Show all) | Major → 22.0.0 |
CVE-2018-1000164 | gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0. | 19.2.0, 19.4.3, 19.1.1, 19.4.1, 0.14.6, 0.17.1, 0.15.0, 17.5 (Show all) | Major → 22.0.0 |
Instantly see if these gunicorn
vulnerabilities affect your code.
Dependencies
Packages using versions of gunicorn affected by its vulnerabilities
Dependent Packages |
---|
packaging |
importlib-metadata; python_version < "3.8" |
eventlet!=0.36.0,>=0.24.1; extra == "eventlet" |
gevent>=1.4.0; extra == "gevent" |
setproctitle; extra == "setproctitle" |
gevent; extra == "testing" |
eventlet; extra == "testing" |
coverage; extra == "testing" |
pytest; extra == "testing" |
pytest-cov; extra == "testing" |
tornado>=0.2; extra == "tornado" |