Description
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
Published: 2020-07-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0233 Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
Github GHSA Github GHSA GHSA-f97h-2pfx-f59f HTTP response splitting in uvicorn
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-17T00:06:47.000Z

Reserved: 2020-01-21T00:00:00.000Z

Link: CVE-2020-7695

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-27T12:15:11.993

Modified: 2024-11-21T05:37:37.720

Link: CVE-2020-7695

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses