CVE-2021-41945

Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
References
Link Resource
http://encode.com Vendor Advisory
https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 Exploit Third Party Advisory
https://github.com/encode/httpx Product Third Party Advisory
https://github.com/encode/httpx/discussions/1831 Exploit Issue Tracking Third Party Advisory
https://github.com/encode/httpx/issues/2184 Exploit Issue Tracking Third Party Advisory
https://github.com/encode/httpx/releases/tag/0.23.0 Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:encode:httpx:*:*:*:*:*:python:*:*

History

12 Oct 2022, 02:40

Type Values Removed Values Added
References (MISC) https://github.com/encode/httpx/releases/tag/0.23.0 - (MISC) https://github.com/encode/httpx/releases/tag/0.23.0 - Release Notes, Third Party Advisory
CPE cpe:2.3:a:encode:httpx:1.0.0:beta0:*:*:*:python:*:*

23 May 2022, 18:16

Type Values Removed Values Added
Summary Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`. Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
References
  • (MISC) https://github.com/encode/httpx/releases/tag/0.23.0 -

09 May 2022, 12:56

Type Values Removed Values Added
First Time Encode httpx
Encode
CPE cpe:2.3:a:encode:httpx:*:*:*:*:*:python:*:*
cpe:2.3:a:encode:httpx:1.0.0:beta0:*:*:*:python:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 9.1
CWE CWE-20
References (MISC) https://github.com/encode/httpx/discussions/1831 - (MISC) https://github.com/encode/httpx/discussions/1831 - Exploit, Issue Tracking, Third Party Advisory
References (MISC) https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 - (MISC) https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 - Exploit, Third Party Advisory
References (MISC) https://github.com/encode/httpx - (MISC) https://github.com/encode/httpx - Product, Third Party Advisory
References (MISC) http://encode.com - (MISC) http://encode.com - Vendor Advisory
References (MISC) https://github.com/encode/httpx/issues/2184 - (MISC) https://github.com/encode/httpx/issues/2184 - Exploit, Issue Tracking, Third Party Advisory

28 Apr 2022, 16:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/encode/httpx/issues/2184 -
Summary Encode OSS <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`. Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.

28 Apr 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-28 14:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-41945

Mitre link : CVE-2021-41945

CVE.ORG link : CVE-2021-41945


JSON object : View

Products Affected

encode

  • httpx
CWE
CWE-20

Improper Input Validation