First published: Fri Dec 16 2016(Updated: )
bottle.py is a fast and simple micro-framework for python web-applications. redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/bottle | >=0.10.1<0.12.11 | 0.12.11 |
Bottle (bottlepy) | =0.12.10 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9964 has a medium severity level due to its potential for CRLF attacks.
To fix CVE-2016-9964, upgrade to bottle version 0.12.11 or later.
CVE-2016-9964 allows an attacker to perform CRLF injection, which could lead to session hijacking or request forgery.
CVE-2016-9964 affects bottle.py version 0.12.10.
Yes, web applications deployed on Debian 8.0 using bottle.py version 0.12.10 are susceptible to CVE-2016-9964.