CVE-2016-5699

CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
References
Link Resource
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7 Mailing List
http://www.openwall.com/lists/oss-security/2016/06/15/12 Mailing List
http://www.openwall.com/lists/oss-security/2016/06/16/2 Mailing List
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 Release Notes
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS Release Notes
https://hg.python.org/cpython/rev/1c45047c5102 Patch
https://hg.python.org/cpython/rev/bf3e1c9b80e9 Patch
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7 Mailing List
http://www.openwall.com/lists/oss-security/2016/06/15/12 Mailing List
http://www.openwall.com/lists/oss-security/2016/06/16/2 Mailing List
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 Release Notes
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS Release Notes
https://hg.python.org/cpython/rev/1c45047c5102 Patch
https://hg.python.org/cpython/rev/bf3e1c9b80e9 Patch
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.4.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html - Exploit, Third Party Advisory () http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html - Exploit, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1626.html - () http://rhn.redhat.com/errata/RHSA-2016-1626.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1627.html - () http://rhn.redhat.com/errata/RHSA-2016-1627.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1628.html - () http://rhn.redhat.com/errata/RHSA-2016-1628.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1629.html - () http://rhn.redhat.com/errata/RHSA-2016-1629.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1630.html - () http://rhn.redhat.com/errata/RHSA-2016-1630.html -
References () http://www.openwall.com/lists/oss-security/2016/06/14/7 - Mailing List () http://www.openwall.com/lists/oss-security/2016/06/14/7 - Mailing List
References () http://www.openwall.com/lists/oss-security/2016/06/15/12 - Mailing List () http://www.openwall.com/lists/oss-security/2016/06/15/12 - Mailing List
References () http://www.openwall.com/lists/oss-security/2016/06/16/2 - Mailing List () http://www.openwall.com/lists/oss-security/2016/06/16/2 - Mailing List
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -
References () http://www.securityfocus.com/bid/91226 - () http://www.securityfocus.com/bid/91226 -
References () http://www.splunk.com/view/SP-CAAAPSV - () http://www.splunk.com/view/SP-CAAAPSV -
References () http://www.splunk.com/view/SP-CAAAPUE - () http://www.splunk.com/view/SP-CAAAPUE -
References () https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 - Release Notes () https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 - Release Notes
References () https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS - Release Notes () https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS - Release Notes
References () https://hg.python.org/cpython/rev/1c45047c5102 - Patch () https://hg.python.org/cpython/rev/1c45047c5102 - Patch
References () https://hg.python.org/cpython/rev/bf3e1c9b80e9 - Patch () https://hg.python.org/cpython/rev/bf3e1c9b80e9 - Patch
References () https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html - () https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html -

Information

Published : 2016-09-02 14:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5699

Mitre link : CVE-2016-5699

CVE.ORG link : CVE-2016-5699


JSON object : View

Products Affected

python

  • python
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')