A CRLF injection flaw was discovered in python in the way URLs are handled when doing an HTTP/HTTPS connection (e.g. through urlopen() or HTTPConnection). An attacker who can control the url parameter passed to urlopen method in the urllib/urllib2 modules can inject CRLF sequences and HTTP headers by abusing the "host" part of the URL.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | python27 | 2020-07-27 23:54 | ALAS-2020-1407 |
Amazon Linux 1 | python27 | 2020-05-22 20:58 | ALAS-2020-1375 |
Amazon Linux 1 | python34 | 2020-08-27 02:29 | ALAS-2020-1429 |
Amazon Linux 1 | python34 | 2020-07-27 23:54 | ALAS-2020-1407 |
Amazon Linux 1 | python35 | 2020-08-27 02:29 | ALAS-2020-1429 |
Amazon Linux 1 | python35 | 2020-07-27 23:54 | ALAS-2020-1407 |
Amazon Linux 1 | python36 | 2020-07-27 23:54 | ALAS-2020-1407 |
Amazon Linux 1 | python36 | 2020-08-27 02:25 | ALAS-2020-1428 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.5 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |
NVD | CVSSv3 | 6.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |