CVE-2023-24329

HIGH

Python <3.11.4 - Open Redirect

Title source: llm

Description

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

Exploits (5)

github WORKING POC 1 stars
by JawadPy · pythonpoc
https://github.com/JawadPy/CVE-Exploit-Collection/tree/main/CVE-2023-24329-Exploit
nomisec WORKING POC
by jithinodattu · poc
https://github.com/jithinodattu/CVE-2023-24329-lab
nomisec WORKING POC
by PenTestMano · poc
https://github.com/PenTestMano/CVE-2023-24329-Exploit
nomisec WORKING POC
by Pandante-Central · poc
https://github.com/Pandante-Central/CVE-2023-24329-codeql-test
nomisec WORKING POC
by H4R335HR · poc
https://github.com/H4R335HR/CVE-2023-24329-PoC

References (29)

... and 9 more

Scores

CVSS v3 7.5
EPSS 0.0108
EPSS Percentile 77.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

CWE
CWE-20
Status published
Products (8)
fedoraproject/fedora 36
fedoraproject/fedora 37
fedoraproject/fedora 38
netapp/active_iq_unified_manager (2 CPE variants)
netapp/management_services_for_element_software
netapp/management_services_for_netapp_hci
netapp/ontap_select_deploy_administration_utility
python/python < 3.7.17
Published Feb 17, 2023
Tracked Since Feb 18, 2026