First published: Mon Feb 10 2020(Updated: )
A flaw was found in Python. The built-in modules httplib and http.client (included in Python 2 and Python 3, respectively) do not properly validate CRLF sequences in the HTTP request method, potentially allowing manipulation to the request by injecting additional HTTP headers. The highest threat from this vulnerability is to confidentiality and integrity.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <0:2.7.5-92.el7_9 | 0:2.7.5-92.el7_9 |
redhat/python3 | <0:3.6.8-37.el8 | 0:3.6.8-37.el8 |
redhat/python3 | <0:3.6.8-24.el8_2 | 0:3.6.8-24.el8_2 |
redhat/rh-python36-python | <0:3.6.12-1.el6 | 0:3.6.12-1.el6 |
redhat/rh-python36-python-pip | <0:9.0.1-5.el6 | 0:9.0.1-5.el6 |
redhat/rh-python36-python-virtualenv | <0:15.1.0-3.el6 | 0:15.1.0-3.el6 |
redhat/python27-python | <0:2.7.18-2.el7 | 0:2.7.18-2.el7 |
redhat/python27-python-pip | <0:8.1.2-6.el7 | 0:8.1.2-6.el7 |
redhat/python27-python-virtualenv | <0:13.1.0-4.el7 | 0:13.1.0-4.el7 |
redhat/rh-python36-python | <0:3.6.12-1.el7 | 0:3.6.12-1.el7 |
redhat/rh-python36-python-pip | <0:9.0.1-5.el7 | 0:9.0.1-5.el7 |
redhat/rh-python36-python-virtualenv | <0:15.1.0-3.el7 | 0:15.1.0-3.el7 |
redhat/rh-python38-python | <0:3.8.6-1.el7 | 0:3.8.6-1.el7 |
redhat/rh-python38-python-psutil | <0:5.6.4-5.el7 | 0:5.6.4-5.el7 |
redhat/rh-python38-python-urllib3 | <0:1.25.7-6.el7 | 0:1.25.7-6.el7 |
Python Python | >=3.0.0<3.5.10 | |
Python Python | >=3.6.0<3.6.12 | |
Python Python | >=3.7.0<3.7.9 | |
Python Python | >=3.8.0<3.8.5 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Solidfire | ||
Netapp Hci Compute Node | ||
Netapp Hci Storage Node | ||
Debian Debian Linux | =9.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
openSUSE Leap | =15.1 | |
redhat/python | <3.8.5 | 3.8.5 |
redhat/python | <3.7.9 | 3.7.9 |
redhat/python | <3.6.12 | 3.6.12 |
redhat/python | <3.5.10 | 3.5.10 |
debian/pypy3 | 7.3.5+dfsg-2+deb11u2 7.3.5+dfsg-2+deb11u4 7.3.11+dfsg-2+deb12u2 7.3.17+dfsg-3 | |
debian/python2.7 | <=2.7.18-8+deb11u1 | |
debian/python3.9 | 3.9.2-1 3.9.2-1+deb11u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-26116 is a vulnerability in Python that allows for CRLF injection through improper validation of user-supplied input in http.client.
CVE-2020-26116 affects Python versions 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5.
By inserting CR and LF control characters in the first argument of HTTPConnection.request, a remote attacker could exploit CVE-2020-26116 to conduct various attacks against the vulnerable Python application.
CVE-2020-26116 has a severity rating of 7.2 (high).
To mitigate CVE-2020-26116, it is recommended to upgrade to Python versions 3.5.10, 3.6.12, 3.7.9, or 3.8.5, depending on your current Python version.