An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "3.7.17"
},
{
"introduced": "3.8.0"
},
{
"fixed": "3.8.17"
},
{
"introduced": "3.9.0"
},
{
"fixed": "3.9.17"
},
{
"introduced": "3.10.0"
},
{
"fixed": "3.10.12"
},
{
"introduced": "3.11.0"
},
{
"fixed": "3.11.4"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "36"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "37"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-24329.json"