In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
References
Information
Published : 2020-05-20 09:15
Updated : 2020-08-19 11:56
NVD link : CVE-2020-11078
Mitre link : CVE-2020-11078
JSON object : View
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
Products Affected
httplib2_project
- httplib2
debian
- debian_linux
fedoraproject
- fedora