Vulnerability Details : CVE-2021-21240
httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2021-21240
Probability of exploitation activity in the next 30 days: 0.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-21240
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
[email protected] |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
[email protected] |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
[email protected] |
CWE ids for CVE-2021-21240
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: [email protected] (Primary)
References for CVE-2021-21240
-
https://pypi.org/project/httplib2
Product;Third Party Advisory
-
https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m
Exploit;Mitigation;Third Party Advisory
-
https://github.com/httplib2/httplib2/pull/182
Patch;Third Party Advisory
-
https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc
Patch;Third Party Advisory
Products affected by CVE-2021-21240
- cpe:2.3:a:httplib2_project:httplib2:*:*:*:*:*:python:*:*