[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1243

ID: oval:org.secpod.oval:def:1601032Date: (C)2019-07-30   (M)2023-11-10
Class: PATCHFamily: unix




An issue was discovered in urllib2 in Python 2.x and urllib in Python 3.x. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n followed by an HTTP header or a Redis command. Python 2.7.x and 3.x are affected by: Improper Handling of Unicode Encoding during NFKC normalization. The impact is: Information disclosure . The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly

Platform:
Amazon Linux AMI
Product:
python35
Reference:
ALAS-2019-1243
CVE-2019-9947
CVE-2019-9740
CVE-2019-9636
CVE    3
CVE-2019-9740
CVE-2019-9636
CVE-2019-9947
CPE    2
cpe:/o:amazon:linux
cpe:/a:python:python35

© SecPod Technologies