CVE-2018-1000164

gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gunicorn:gunicorn:19.4.5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5 - Exploit, Third Party Advisory () https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5 - Exploit, Third Party Advisory
References () https://github.com/benoitc/gunicorn/issues/1227 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/benoitc/gunicorn/issues/1227 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html - Third Party Advisory
References () https://usn.ubuntu.com/4022-1/ - () https://usn.ubuntu.com/4022-1/ -
References () https://www.debian.org/security/2018/dsa-4186 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4186 - Third Party Advisory

Information

Published : 2018-04-18 19:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000164

Mitre link : CVE-2018-1000164

CVE.ORG link : CVE-2018-1000164


JSON object : View

Products Affected

gunicorn

  • gunicorn

debian

  • debian_linux
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')