Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26137

Опубликовано: 30 сент. 2020
Источник: debian
EPSS Низкий

Описание

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-urllib3fixed1.25.9-1package

Примечания

  • https://bugs.python.org/issue39603

  • https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b (1.25.9)

  • https://github.com/urllib3/urllib3/pull/1800

EPSS

Процентиль: 47%
0.00239
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

CVSS3: 6.5
redhat
больше 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

CVSS3: 6.5
nvd
около 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

CVSS3: 6.5
msrc
почти 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

suse-cvrf
около 4 лет назад

Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3

EPSS

Процентиль: 47%
0.00239
Низкий