First published: Thu Jul 04 2019(Updated: )
A CRLF injection flaw was discovered in python in the way URLs are handled when doing an HTTP/HTTPS connection (e.g. through urlopen() or HTTPConnection). An attacker who can control the url parameter passed to urlopen method in the urllib/urllib2 modules can inject CRLF sequences and HTTP headers by abusing the "host" part of the URL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-python36-python | <0:3.6.12-1.el6 | 0:3.6.12-1.el6 |
redhat/rh-python36-python-pip | <0:9.0.1-5.el6 | 0:9.0.1-5.el6 |
redhat/rh-python36-python-virtualenv | <0:15.1.0-3.el6 | 0:15.1.0-3.el6 |
redhat/python27-python | <0:2.7.18-2.el7 | 0:2.7.18-2.el7 |
redhat/python27-python-pip | <0:8.1.2-6.el7 | 0:8.1.2-6.el7 |
redhat/python27-python-virtualenv | <0:13.1.0-4.el7 | 0:13.1.0-4.el7 |
redhat/rh-python36-python | <0:3.6.12-1.el7 | 0:3.6.12-1.el7 |
redhat/rh-python36-python-pip | <0:9.0.1-5.el7 | 0:9.0.1-5.el7 |
redhat/rh-python36-python-virtualenv | <0:15.1.0-3.el7 | 0:15.1.0-3.el7 |
Python Python | >=2.0<=2.7.17 | |
Python Python | >=3.0<3.5.10 | |
Python Python | >=3.6.0<3.6.11 | |
Python Python | >=3.7.0<3.7.8 | |
Python Python | >=3.8.0<3.8.3 | |
debian/python2.7 | 2.7.18-8+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18348 is a CRLF injection vulnerability in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0.
The severity of CVE-2019-18348 is medium with a CVSS score of 6.5.
An attacker can exploit CVE-2019-18348 by controlling a URL parameter to perform CRLF injection.
Python 2.x through 2.7.17 and Python 3.x through 3.8.0 are affected by CVE-2019-18348.
Yes, the fix for CVE-2019-18348 is available in the respective Python versions: 2.7.18 and 3.8.1.