Safety vulnerability ID: 38834
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Urllib3 1.25.9 includes a fix for CVE-2020-26137: Urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
https://github.com/python/cpython/issues/83784
https://github.com/urllib3/urllib3/pull/1800
Latest version: 2.2.3
HTTP library with thread-safe connection pooling, file post, and more.
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
MISC:https://bugs.python.org/issue39603: https://bugs.python.org/issue39603
MISC:https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b: https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
MISC:https://github.com/urllib3/urllib3/pull/1800: https://github.com/urllib3/urllib3/pull/1800
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application