Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-7695

Опубликовано: 27 июл. 2020
Источник: debian

Описание

Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-uvicornfixed0.13.3-1package
python-uvicornno-dsabusterpackage

Примечания

  • https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471

  • https://github.com/encode/uvicorn/issues/719

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 5 лет назад

Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.

CVSS3: 5.3
nvd
больше 5 лет назад

Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.

CVSS3: 7.5
github
больше 5 лет назад

HTTP response splitting in uvicorn