
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-29361 affects Pallets Werkzeug versions 2.1.0 and below. The vulnerability involves improper parsing of HTTP requests that allows attackers to perform HTTP Request Smuggling using crafted HTTP requests with multiple requests included inside the body. The vendor notes that this vulnerability only manifests in unsupported configurations involving development mode and non-Werkzeug HTTP servers (NVD).
The vulnerability has been assigned a CVSS v3.1 score of 9.8 (CRITICAL) and a CVSS v2.0 score of 7.5 (HIGH). The vulnerability specifically relates to how Werkzeug handles HTTP request parsing, particularly when dealing with multiple requests embedded within the request body (NVD).
When exploited, this vulnerability could allow attackers to perform HTTP Request Smuggling attacks. However, the impact is limited to specific configurations where Werkzeug is running in development mode and using a non-Werkzeug HTTP server (NVD).
The vendor's position indicates that this vulnerability only occurs in unsupported configurations. Users should ensure they are not running Werkzeug in development mode in production environments and should use supported HTTP server configurations (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."