#VU28245 CRLF injection


Published: 2020-05-26

Vulnerability identifier: #VU28245

Vulnerability risk: Low

CVSSv3.1: 3.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11078

CWE-ID: CWE-93

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
httplib2
Other software / Other software solutions

Vendor: httplib2

Description

The vulnerability allows a remote attacker to perform CRLF injection attacks.

The vulnerability exists due to insufficient filtration of user-supplied data. A remote attacker controlling unescaped part of uri for "httplib2.Http.request()" can change request headers and body, send additional hidden requests to same server.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

httplib2: 0.9 - 0.17.4


CPE

External links
http://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e
http://github.com/httplib2/httplib2/security/advisories/GHSA-gg84-qgv9-w4pq
http://lists.apache.org/thread.html/rc9eff9572946142b657c900fe63ea4bbd3535911e8d4ce4d08fe4b89@%3Ccommits.allura.apache.org%3E


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability