CVE-2019-18348
Current Description
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
Basic Data
Published | October 23, 2019 |
---|---|
Last Modified | July 15, 2020 |
Assigner | cve@mitre.org |
Data Type | CVE |
Data Format | MITRE |
Data Version | 4.0 |
Problem Type | CWE-74 |
CVE Data Version | 4.0 |
Base Metric V2
CVSS 2 - Version | 2.0 |
---|---|
CVSS 2 - Vector String | AV:N/AC:M/Au:N/C:N/I:P/A:N |
CVSS 2 - Access Vector | NETWORK |
CVSS 2 - Access Complexity | MEDIUM |
CVSS 2 - Authentication | NONE |
CVSS 2 - Confidentiality Impact | NONE |
CVSS 2 - Availability Impact | NONE |
CVSS 2 - Base Score | 4.3 |
Severity | MEDIUM |
Exploitability Score | 8.6 |
Impact Score | 2.9 |
Obtain All Privilege | false |
Obtain User Privilege | false |
Obtain Other Privilege | false |
Base Metric V3
No data provided.
Configurations
-
OR - Configuration 1
Cpe Version Part Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other Version Start Including Version End Including Version Start Excluding Version End Excluding 2.3 Application Python Python * * * * * * * * 2.0 2.7.17