Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2020-0233 | Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers. |
![]() |
GHSA-f97h-2pfx-f59f | HTTP response splitting in uvicorn |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T00:06:47.000Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7695

No data.

Status : Modified
Published: 2020-07-27T12:15:11.993
Modified: 2024-11-21T05:37:37.720
Link: CVE-2020-7695

No data.

No data.