CVE-2024-11168

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
Configurations

No configuration.

History

11 Apr 2025, 22:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250411-0004/ -

06 Jan 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.7

03 Dec 2024, 21:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e -
  • () https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132 -

13 Nov 2024, 16:35

Type Values Removed Values Added
Summary
  • (es) Las funciones urllib.parse.urlsplit() y urlparse() validaron incorrectamente los hosts entre corchetes (`[]`), lo que permitió el uso de hosts que no eran IPv6 o IPvFuture. Este comportamiento no se ajustaba a RFC 3986 y potencialmente habilitaba SSRF si una URL es procesada por más de un analizador de URL.
CWE CWE-918

12 Nov 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-12 22:15

Updated : 2025-04-11 22:15


NVD link : CVE-2024-11168

Mitre link : CVE-2024-11168

CVE.ORG link : CVE-2024-11168


JSON object : View

Products Affected

No product.

CWE
CWE-918

Server-Side Request Forgery (SSRF)