Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
References
Link | Resource |
---|---|
https://github.com/encode/uvicorn | Third Party Advisory |
https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2020-07-27T00:00:00
Updated: 2020-07-29T18:45:49
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7695
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-27T12:15:11.993
Modified: 2023-01-31T17:26:01.747
Link: CVE-2020-7695
JSON object: View
Redhat Information
No data.
CWE