SB20251226146 - IBM watsonx Orchestrate Developer Edition update for Gunicorn



SB20251226146 - IBM watsonx Orchestrate Developer Edition update for Gunicorn

Published: December 26, 2025

Security Bulletin ID SB20251226146
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2024-6827)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to Gunicorn does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. A remote attacker can send a specially crafted HTTP request to the server and initiate cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.


Remediation

Install update from vendor's website.