Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000164

Опубликовано: 18 апр. 2018
Источник: debian
EPSS Низкий

Описание

gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gunicornfixed19.5.0-1package

Примечания

  • https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5

  • https://github.com/benoitc/gunicorn/issues/1227

  • https://github.com/benoitc/gunicorn/commit/5263a4ef2a63c62216680876f3813959839608ff

EPSS

Процентиль: 81%
0.01484
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.

CVSS3: 5.3
redhat
почти 10 лет назад

gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.

CVSS3: 7.5
nvd
почти 8 лет назад

gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.

suse-cvrf
почти 8 лет назад

Security update for python-gunicorn, python3-gunicorn

CVSS3: 7.5
github
больше 7 лет назад

Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers

EPSS

Процентиль: 81%
0.01484
Низкий