CRLF Injection
Affecting python2.7 package, versions <2.7.12-1ubuntu0~16.04.8
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
References
CVSS Score
6.1
medium severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionRequired
-
ScopeChanged
-
ConfidentialityLow
-
IntegrityLow
-
AvailabilityNone
- CVE
- CVE-2019-9740
- CWE
- CWE-93
- Snyk ID
- SNYK-UBUNTU1604-PYTHON27-342983
- Disclosed
- 13 Mar, 2019
- Published
- 13 Mar, 2019