Skip to content

bottle.py vulnerable to CRLF Injection

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Sep 13, 2024

Package

pip bottle (pip)

Affected versions

>= 0.10.1, < 0.12.11

Patched versions

0.12.11

Description

bottle.py is a fast and simple micro-framework for python web-applications. redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

References

Published by the National Vulnerability Database Dec 16, 2016
Published to the GitHub Advisory Database May 17, 2022
Reviewed May 31, 2022
Last updated Sep 13, 2024

Severity

Moderate

EPSS score

0.199%
(58th percentile)

Weaknesses

CVE ID

CVE-2016-9964

GHSA ID

GHSA-j6f7-hghw-g437

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.