Safety vulnerability ID: 38665
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
Latest version: 0.34.0
The lightning-fast ASGI server.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application