Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6pw3-h7xf-x4gp

Опубликовано: 14 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 6.3

Описание

BlackSheep's ClientSession is vulnerable to CRLF injection

Impact

The HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers. The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers.

Attack vector: Applications using user input in HTTP client requests (method, URL, headers).

Patches

Users who use the HTTP Client in BlackSheep should upgrade to 2.4.6.

Workarounds

If users handle headers from untrusted parties, they might reject values for header names and values that contain carriage returns.

References

https://owasp.org/www-community/vulnerabilities/CRLF_Injection

Пакеты

Наименование

blacksheep

pip
Затронутые версииВерсия исправления

< 2.4.6

2.4.6

EPSS

Процентиль: 14%
0.00045
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-113
CWE-93

Связанные уязвимости

nvd
5 дней назад

BlackSheep is an asynchronous web framework to build event based web applications with Python. Prior to 2.4.6, the HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers.The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers. This vulnerability is fixed in 2.4.6.

EPSS

Процентиль: 14%
0.00045
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-113
CWE-93