An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3575-1 | python2.7 security update |
![]() |
DLA-3948-1 | pypy3 security update |
![]() |
DLA-3980-1 | python3.9 security update |
![]() |
EUVD-2023-28385 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. |
![]() |
USN-5888-1 | Python vulnerabilities |
![]() |
USN-5960-1 | Python vulnerability |
![]() |
USN-6139-1 | Python vulnerability |
![]() |
USN-6891-1 | Python vulnerabilities |
![]() |
USN-7180-1 | Python vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-18T16:26:01.513Z
Reserved: 2023-01-23T00:00:00.000Z
Link: CVE-2023-24329

Updated: 2024-08-02T10:56:03.505Z

Status : Modified
Published: 2023-02-17T15:15:12.243
Modified: 2025-03-18T17:15:41.693
Link: CVE-2023-24329


No data.