vulnerability

Amazon Linux AMI 2: CVE-2023-24329: Security patch for python, python3, python38 (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
2023-02-17
Added
2023-03-07
Modified
2025-01-28

Description

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

Solution(s)

amazon-linux-ami-2-upgrade-pythonamazon-linux-ami-2-upgrade-python-debugamazon-linux-ami-2-upgrade-python-debuginfoamazon-linux-ami-2-upgrade-python-develamazon-linux-ami-2-upgrade-python-libsamazon-linux-ami-2-upgrade-python-testamazon-linux-ami-2-upgrade-python-toolsamazon-linux-ami-2-upgrade-python3amazon-linux-ami-2-upgrade-python3-debugamazon-linux-ami-2-upgrade-python3-debuginfoamazon-linux-ami-2-upgrade-python3-develamazon-linux-ami-2-upgrade-python3-libsamazon-linux-ami-2-upgrade-python3-testamazon-linux-ami-2-upgrade-python3-tkinteramazon-linux-ami-2-upgrade-python3-toolsamazon-linux-ami-2-upgrade-python38amazon-linux-ami-2-upgrade-python38-debugamazon-linux-ami-2-upgrade-python38-debuginfoamazon-linux-ami-2-upgrade-python38-develamazon-linux-ami-2-upgrade-python38-libsamazon-linux-ami-2-upgrade-python38-testamazon-linux-ami-2-upgrade-python38-tkinteramazon-linux-ami-2-upgrade-python38-toolsamazon-linux-ami-2-upgrade-tkinter
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.