CVE-2024-6827

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-6827
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6827.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-6827
Aliases
Downstream
Related
Published
2025-03-20T10:15:33Z
Modified
2025-08-09T19:01:27Z
Summary
[none]
Details

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

References

Affected packages