CVE-2024-11168
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
- T
Tim Bastin detected CVE-2024-11168
System updated the risk assessment to 1.7
System recalculated raw risk assessment
- T
Tim Bastin fixed CVE-2024-11168
- T
Tim Bastin detected CVE-2024-11168 with a risk of 1.7
System updated the risk assessment to 0.85
System recalculated raw risk assessment
System updated the risk assessment to 1.7
System recalculated raw risk assessment
System updated the risk assessment to 0.85
System recalculated raw risk assessment
System updated the risk assessment from 0.85 to 0.42
System recalculated raw risk assessment
System updated the risk assessment from 0.42 to 0.85
System recalculated raw risk assessment
System updated the risk assessment from 0.85 to 1.7
System recalculated raw risk assessment
System updated the risk assessment from 1.7 to 0.85
System recalculated raw risk assessment
System detected CVE-2024-11168 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2024-11168
System detected CVE-2024-11168 with a risk of 0.85
System removed scanner: container-scanning
System detected CVE-2024-11168 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2024-11168
System detected CVE-2024-11168 with a risk of 0.85
- T
Tim Bastin fixed CVE-2024-11168
System updated the risk assessment from 0.85 to 1.7
System recalculated raw risk assessment
Reopen this vulnerability
Affected component
debian/python3.11