CVE-2021-41945: Improper Input Validation in httpx
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65466%
CWE
Published
4/29/2022
Updated
9/23/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
httpx | pip | < 0.23.0 | 0.23.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from URL.copy_with's improper handling of URI references. The commit diff shows the fix involved replacing direct unsplit() usage with normalization logic. Multiple sources (CVE description, GHSA, PoC) demonstrate that 1) copy_with's unsplit operation caused unexpected normalization 2) This was exploited in Client/Proxy initialization. Though only copy_with is explicitly modified in the patch, Client and Proxy are explicitly listed as vulnerable components in CVE description and PoC examples.