Skip to content

bottle.py vulnerable to CRLF Injection

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Jan 29, 2023

Package

pip bottle (pip)

Affected versions

< 0.12.10

Patched versions

0.12.10

Description

bottle.py is a fast and simple micro-framework for python web-applications. redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

References

Published by the National Vulnerability Database Dec 16, 2016
Published to the GitHub Advisory Database May 17, 2022
Reviewed May 31, 2022
Last updated Jan 29, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2016-9964

GHSA ID

GHSA-j6f7-hghw-g437

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.