GHSA-j6f7-hghw-g437

Suggest an improvement
Source
https://github.com/advisories/GHSA-j6f7-hghw-g437
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-j6f7-hghw-g437/GHSA-j6f7-hghw-g437.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j6f7-hghw-g437
Aliases
Published
2022-05-17T03:05:15Z
Modified
2024-09-13T14:44:26.207684Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
bottle.py vulnerable to CRLF Injection
Details

bottle.py is a fast and simple micro-framework for python web-applications. redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

References

Affected packages

PyPI / bottle

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.10.1
Fixed
0.12.11

Affected versions

0.*

0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.10.6
0.10.7
0.10.8
0.10.9
0.10.10
0.10.11
0.10.12
0.11.1
0.11.2
0.11.3
0.11.4
0.11.5
0.11.6
0.11.7
0.12.1
0.12.2
0.12.3
0.12.4
0.12.5
0.12.6
0.12.7
0.12.8
0.12.9
0.12.10