Home

Description

Reliance on Untrusted Inputs in a Security Decision vulnerability in mtrudel bandit allows unauthenticated transport-state spoofing on plaintext HTTP connections. 'Elixir.Bandit.Pipeline':determine_scheme/2 in lib/bandit/pipeline.ex returns the client-supplied URI scheme verbatim, ignoring the transport's secure? flag. HTTP/1.1 absolute-form request targets (e.g. GET https://victim/path HTTP/1.1) and the HTTP/2 :scheme pseudo-header are both attacker-controlled strings that flow through this function. Over a plaintext TCP connection, a client can declare https and Bandit will set conn.scheme = :https even though no TLS was negotiated. Downstream Plug consumers that branch on conn.scheme are silently misled: Plug.SSL's already-secure branch skips its HTTP→HTTPS redirect, cookies emitted with secure: true are sent over plaintext, audit logs record requests as having arrived over HTTPS, and CSRF/SameSite gating may make incorrect decisions. This issue affects bandit: from 1.0.0 before 1.11.0.

PUBLISHED Reserved 2026-04-07 | Published 2026-05-01 | Updated 2026-05-02 | Assigner EEF




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-807 Reliance on Untrusted Inputs in a Security Decision

Product status

Default status
unaffected

1.0.0 (semver) before 1.11.0
affected

Default status
unaffected

ff2f829326cd5dcf7335939aef9775269d881e28 (git) before 1.11.0
affected

Credits

Peter Ullrich finder

Mat Trudel remediation developer

Jonatan Männchen analyst

References

github.com/...bandit/security/advisories/GHSA-375f-4r2h-f99j exploit

github.com/...bandit/security/advisories/GHSA-375f-4r2h-f99j vendor-advisory related

cna.erlef.org/cves/CVE-2026-39807.html related

osv.dev/vulnerability/EEF-CVE-2026-39807 related

github.com/...ommit/45feea20dea8af7ffd7245271107b695c040e667 patch

cve.org (CVE-2026-39807)

nvd.nist.gov (CVE-2026-39807)

Download JSON