CVE-2021-23336

MEDIUM

Python/cpython <3.6.13, <3.7.10, <3.8.8, <3.9.2 - Web Cache Poisoning

Title source: llm

Description

The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.

References (37)

... and 17 more

Scores

CVSS v3 5.9
EPSS 0.0030
EPSS Percentile 52.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H

Classification

CWE
CWE-444
Status published

Affected Products (14)

python/python < 3.6.13
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
debian/debian_linux
netapp/cloud_backup
netapp/inventory_collect_tool
netapp/ontap_select_deploy_administration_utility
netapp/snapcenter
djangoproject/django < 2.2.19
oracle/communications_offline_mediation_controller
oracle/communications_pricing_design_center
oracle/enterprise_manager_ops_center
oracle/zfs_storage_appliance

Timeline

Published Feb 15, 2021
Tracked Since Feb 18, 2026