Miggo Logo

CVE-2023-41419:
Gevent allows remote attacker to escalate privileges

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.85051%
CWE
-
Published
9/25/2023
Updated
11/4/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
geventpip< 23.9.023.9.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of HTTP chunked transfer encoding trailers in WSGIServer. The commit shows critical modifications to __read_chunk_length (added strict validation of HEX characters, chunk size limits, and trailer processing) and handle_one_response (added error handling for invalid client input). The CVE description explicitly mentions crafted chunk trailers being misinterpreted as new requests, which aligns with the pre-patch behavior of these functions. Test cases in test__pywsgi.py demonstrate scenarios where malicious trailers could be smuggled as new requests.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* in **v*nt ***or* v*rsion **.*.* *llows * r*mot* *tt**k*r to *s**l*t* privil***s vi* * *r**t** s*ript to t** WS*IS*rv*r *ompon*nt.

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* *TTP **unk** tr*ns**r *n*o*in* tr*il*rs in WS*IS*rv*r. T** *ommit s*ows *riti**l mo*i*i**tions to __r***_**unk_l*n*t* (***** stri*t v*li**tion o* **X ***r**t*rs, **unk siz* limits, *n* tr*il*r pro**ss