Описание
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
Ссылки
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:bottlepy:bottle:0.12.10:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
EPSS
Процентиль: 77%
0.01087
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-93
Связанные уязвимости
CVSS3: 6.5
ubuntu
около 9 лет назад
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
CVSS3: 6.5
debian
около 9 лет назад
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequ ...
EPSS
Процентиль: 77%
0.01087
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-93