It was discovered that Python incorrectly handled parsing bracketed hosts. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack.
{ "binaries": [ { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "idle-python3.8" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "libpython3.8" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "libpython3.8-dev" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "libpython3.8-minimal" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "libpython3.8-stdlib" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "libpython3.8-testsuite" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "python3.8" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "python3.8-dev" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "python3.8-examples" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "python3.8-full" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "python3.8-minimal" }, { "binary_version": "3.8.10-0ubuntu1~20.04.14", "binary_name": "python3.8-venv" } ], "availability": "No subscription required" }
{ "cves_map": { "ecosystem": "Ubuntu:20.04:LTS", "cves": [ { "id": "CVE-2024-11168", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/AU:N" }, { "type": "Ubuntu", "score": "medium" } ] } ] } }
{ "binaries": [ { "binary_version": "3.10.12-1~22.04.8", "binary_name": "idle-python3.10" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "libpython3.10" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "libpython3.10-dev" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "libpython3.10-minimal" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "libpython3.10-stdlib" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "libpython3.10-testsuite" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10-dev" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10-examples" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10-full" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10-minimal" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10-nopie" }, { "binary_version": "3.10.12-1~22.04.8", "binary_name": "python3.10-venv" } ], "availability": "No subscription required" }
{ "cves_map": { "ecosystem": "Ubuntu:22.04:LTS", "cves": [ { "id": "CVE-2024-11168", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/AU:N" }, { "type": "Ubuntu", "score": "medium" } ] } ] } }