In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T11:21:14.627Z

Reserved: 2020-03-30T00:00:00

Link: CVE-2020-11078

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-20T16:15:10.657

Modified: 2024-11-21T04:56:44.373

Link: CVE-2020-11078

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-05-20T00:00:00Z

Links: CVE-2020-11078 - Bugzilla

cve-icon OpenCVE Enrichment

No data.