Improper Input Validation Affecting python package, versions <0:2.7.5-38.el7_2
Snyk CVSS
Attack Complexity
Low
Scope
Changed
Threat Intelligence
EPSS
28.87% (97th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-PYTHON-2067287
- published 26 Jul 2021
- disclosed 18 Jul 2016
Introduced: 18 Jul 2016
CVE-2016-1000110 Open this link in a new tabHow to fix?
Upgrade Centos:7
python
to version 0:2.7.5-38.el7_2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python
package and not the python
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
References
- https://access.redhat.com/security/cve/CVE-2016-1000110
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
- https://security-tracker.debian.org/tracker/CVE-2016-1000110
- https://access.redhat.com/errata/RHSA-2016:1626
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/