The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

Project Subscriptions

Vendors Products
Python Software Foundation Subscribe
Cpython Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3980-1 python3.9 security update
Debian DLA Debian DLA DLA-4354-1 pypy3 security update
EUVD EUVD EUVD-2024-34319 The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
Ubuntu USN Ubuntu USN USN-7218-1 Python vulnerability
Ubuntu USN Ubuntu USN USN-7280-3 Python 2.7 regression
Ubuntu USN Ubuntu USN USN-7348-1 Python vulnerabilities
Ubuntu USN Ubuntu USN USN-7488-1 Python vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00198}

epss

{'score': 0.00214}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00214}

epss

{'score': 0.00198}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00198}

epss

{'score': 0.00214}


Fri, 11 Apr 2025 22:45:00 +0000

Type Values Removed Values Added
References

Thu, 12 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9

Thu, 05 Dec 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Tue, 03 Dec 2024 20:45:00 +0000


Wed, 13 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Python Software Foundation
Python Software Foundation cpython
Weaknesses CWE-918
CPEs cpe:2.3:a:python_software_foundation:cpython:*:*:*:*:*:*:*:*
Vendors & Products Python Software Foundation
Python Software Foundation cpython
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 01:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1287
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}

threat_severity

Moderate


Tue, 12 Nov 2024 21:45:00 +0000


Tue, 12 Nov 2024 21:30:00 +0000

Type Values Removed Values Added
Description The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
Title Improper validation of IPv6 and IPvFuture addresses
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/AU:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2025-11-03T21:51:45.721Z

Reserved: 2024-11-12T21:13:15.779Z

Link: CVE-2024-11168

cve-icon Vulnrichment

Updated: 2025-11-03T21:51:45.721Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-12T22:15:14.920

Modified: 2025-11-03T22:16:37.230

Link: CVE-2024-11168

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-12T21:22:23Z

Links: CVE-2024-11168 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses