redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
References
Link Resource
http://www.debian.org/security/2016/dsa-3743 Third Party Advisory
http://www.securityfocus.com/bid/94961 Third Party Advisory VDB Entry
https://github.com/bottlepy/bottle/commit/6d7e13da0f998820800ecb3fe9ccee4189aefb54 Issue Tracking Patch Third Party Advisory
https://github.com/bottlepy/bottle/issues/913 Issue Tracking Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2016-12-16T09:02:00

Updated: 2017-01-04T14:57:01

Reserved: 2016-12-16T00:00:00


Link: CVE-2016-9964

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2016-12-16T09:59:00.373

Modified: 2017-01-11T03:00:14.537


Link: CVE-2016-9964

JSON object: View

cve-icon Redhat Information

No data.

CWE