Skip to content

[SECURITY] CVE-2019-9740 urllib / urllib2: CRLF injection is possible if the attacker controls a url parameter #98

@petehalbeisen

Description

@petehalbeisen

Hi, We use this library in our product's scripting engine and it's failing our security scans.

https://nvd.nist.gov/vuln/detail/CVE-2019-9740

Severity: Medium
Status New
Classification Definitive
Fix Group ID: a597f702-ac86-eb11-85aa-2818780a4fcb
Location <our_lib>/jython.jar
Source File <our_lib>/jython.jar
Date Created Tuesday, March 16, 2021
Last Updated Tuesday, March 16, 2021
CVE https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-9740
CWE:
829
File:
<our_lib>/jython.jar
Name: CVE-2019-9740
Description: An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
Resolution: Upgrade to version v2.7.17,v3.5.8,v3.6.9,3.7.4,3.7.5
URL:
https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-9740

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions