mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
24 lines
955 B
Markdown
24 lines
955 B
Markdown
![]() |
### [CVE-2023-24329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/python/cpython/issues/102153
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/GitHubForSnap/matrix-commander-gael
|
||
|
- https://github.com/H4R335HR/CVE-2023-24329-PoC
|
||
|
- https://github.com/JawadPy/CVE-2023-24329-Exploit
|
||
|
- https://github.com/NathanielAPawluk/sec-buddy
|
||
|
- https://github.com/Pandante-Central/CVE-2023-24329-codeql-test
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
|