Safety vulnerability ID: 45685
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command.
Latest version: 0.9.8
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application