CVE-2021-21240 - log back

CVE-2021-21240 edited at 01 Mar 2021 20:41:47
Description
- In python-httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
+ In python-httplib2 before version 0.19.0, a malicious server which responds with a long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
CVE-2021-21240 edited at 08 Feb 2021 21:51:07
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Denial of service
Description
+ In python-httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
References
+ https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m
+ https://github.com/httplib2/httplib2/pull/182
+ https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc
Notes
+ Workaround
+ ==========
+
+ The issue can be mitigated by using "httplib2.USE_WWW_AUTH_STRICT_PARSING = True".
CVE-2021-21240 created at 08 Feb 2021 21:48:10