Safety vulnerability ID: 25642
The information on this page was manually curated by our Cybersecurity Intelligence Team.
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
Latest version: 0.13.2
Fast and simple WSGI-framework for small web-applications.
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application