redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
References
Link | Resource |
---|---|
https://github.com/bottlepy/bottle/issues/913 | Issue Tracking Patch Third Party Advisory |
https://github.com/bottlepy/bottle/commit/6d7e13da0f998820800ecb3fe9ccee4189aefb54 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/94961 | Third Party Advisory VDB Entry |
http://www.debian.org/security/2016/dsa-3743 | Third Party Advisory |
Information
Published : 2016-12-16 01:59
Updated : 2017-01-10 19:00
NVD link : CVE-2016-9964
Mitre link : CVE-2016-9964
JSON object : View
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
Products Affected
debian
- debian_linux
bottlepy
- bottle