ALPINE-CVE-2022-29361

Source
https://security.alpinelinux.org/vuln/CVE-2022-29361
Import Source
https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-29361.json
JSON Data
https://api.osv.dev/v1/vulns/ALPINE-CVE-2022-29361
Upstream
Published
2022-05-25T01:15:07.277Z
Modified
2025-12-03T23:03:38.046996Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project

References

Affected packages

Alpine:v3.23 / py3-werkzeug

Package

Name
py3-werkzeug
Purl
pkg:apk/alpine/py3-werkzeug?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.2-r0

Affected versions

0.*

0.8.3-r0
0.9.4-r0
0.9.5-r0
0.9.6-r0
0.11.11-r0
0.11.15-r0
0.11.15-r1
0.11.15-r2
0.14.1-r0
0.14.1-r1
0.14.1-r2
0.14.1-r3
0.15.2-r0
0.16.1-r0

1.*

1.0.1-r0
1.0.1-r1
1.0.1-r2

2.*

2.0.0-r0
2.0.1-r0
2.0.2-r0
2.0.2-r1
2.0.3-r0