CVE-2024-1135 Impact of CVE-2024-1135
Description
The Palo Alto Networks Product Security Assurance team has evaluated CVE-2024-1135 as it applies to our products.
The Broker VM used in following products is vulnerable to CVE-2024-1135:
- Cortex XDR
- Cortex XSIAM
CVE | Summary |
---|---|
CVE-2024-1135 | Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability allows for a range of attacks including cache poisoning, session manipulation, and data exposure. |
Product Status
Versions | Affected | Unaffected |
---|---|---|
Cortex XDR Broker VM | < 25.105.6 | >= 25.105.6 |
Required Configuration for Exposure
No special configuration is required to be affected by this issue.
Severity: MEDIUM, Suggested Urgency: MODERATE
CVSS-BT: 6.6 / CVSS-B: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
CAPEC-105 HTTP Request Splitting
Solution
This issue is fixed in Broker VM 25.105.6 and all later versions of Broker VM. If you have enabled automatic upgrades for Broker VM, no action is needed. We recommend enabling automatic upgrades for Broker VM to ensure you always have the latest security patches installed.
Workarounds and Mitigations
No workaround or mitigation is available.