Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26137

Опубликовано: 30 сент. 2020
Источник: debian

Описание

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-urllib3fixed1.25.9-1package

Примечания

  • https://bugs.python.org/issue39603

  • https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b (1.25.9)

  • https://github.com/urllib3/urllib3/pull/1800

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

CVSS3: 6.5
redhat
почти 6 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

CVSS3: 6.5
nvd
около 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

CVSS3: 6.5
msrc
почти 5 лет назад

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

suse-cvrf
больше 4 лет назад

Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3