vulnerability

Amazon Linux 2023: CVE-2023-24329: Medium priority package update for python3.9 (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
2023-02-17
Added
2025-02-17
Modified
2025-02-17

Description

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.

Solution(s)

amazon-linux-2023-upgrade-python3amazon-linux-2023-upgrade-python3-11amazon-linux-2023-upgrade-python3-11-debugamazon-linux-2023-upgrade-python3-11-debuginfoamazon-linux-2023-upgrade-python3-11-debugsourceamazon-linux-2023-upgrade-python3-11-develamazon-linux-2023-upgrade-python3-11-idleamazon-linux-2023-upgrade-python3-11-libsamazon-linux-2023-upgrade-python3-11-testamazon-linux-2023-upgrade-python3-11-tkinteramazon-linux-2023-upgrade-python3-9-debuginfoamazon-linux-2023-upgrade-python3-9-debugsourceamazon-linux-2023-upgrade-python3-debugamazon-linux-2023-upgrade-python3-develamazon-linux-2023-upgrade-python3-idleamazon-linux-2023-upgrade-python3-libsamazon-linux-2023-upgrade-python3-testamazon-linux-2023-upgrade-python3-tkinteramazon-linux-2023-upgrade-python-unversioned-command
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.