First published: Wed Mar 13 2019(Updated: )
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n followed by an HTTP header or a Redis command. Reference: <a href="https://bugs.python.org/issue36276">https://bugs.python.org/issue36276</a>
Affected Software | Affected Version | How to fix |
---|---|---|
urllib | >=2.0<=2.7.16 | |
urllib3 | >=3.0<=3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1688169 is significant due to the potential for CRLF injection attacks.
To fix REDHAT-BUG-1688169, upgrade to Python 2.7.17 or higher for urllib2 and Python 3.7.3 or higher for urllib.
Versions of urllib2 before 2.7.17 and urllib before 3.7.3 are affected by REDHAT-BUG-1688169.
REDHAT-BUG-1688169 can facilitate CRLF injection attacks if an attacker controls the URL parameter.
The components involved in REDHAT-BUG-1688169 are urllib2 for Python 2.x and urllib for Python 3.x.