Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j6f7-hghw-g437

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 7.1
CVSS3: 6.5

Описание

bottle.py vulnerable to CRLF Injection

bottle.py is a fast and simple micro-framework for python web-applications. redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

Пакеты

Наименование

bottle

pip
Затронутые версииВерсия исправления

>= 0.10.1, < 0.12.11

0.12.11

EPSS

Процентиль: 78%
0.01087
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-93

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 9 лет назад

redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

CVSS3: 6.5
nvd
около 9 лет назад

redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

CVSS3: 6.5
debian
около 9 лет назад

redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequ ...

EPSS

Процентиль: 78%
0.01087
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-93