First published: Wed Apr 03 2019(Updated: )
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL) followed by an HTTP header or a Redis command. This is similar to <a href="https://access.redhat.com/security/cve/CVE-2019-9740">CVE-2019-9740</a> query string issue. Reference: <a href="https://bugs.python.org/issue35906">https://bugs.python.org/issue35906</a>
Affected Software | Affected Version | How to fix |
---|---|---|
urllib | >=2.0<2.7.16 | |
urllib3 | >=3.0<3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1695572 is classified as a CRLF injection issue which can severely impact the integrity of applications that rely on URL parsing.
To mitigate the risks associated with REDHAT-BUG-1695572, upgrade Python versions to at least 2.7.17 for Python 2.x and 3.7.3 for Python 3.x.
The affected software for REDHAT-BUG-1695572 includes Python urllib2 versions up to 2.7.16 and Python urllib versions up to 3.7.2.
REDHAT-BUG-1695572 allows attackers to perform CRLF injection attacks through controlled URL parameters.
No, exploitation of REDHAT-BUG-1695572 does not require authentication, making it a significant risk.