urllib3 is vulnerable to carriage-return line-feed (CRLF) injection. The vulnerability exists as it does not sufficiently check for non-token characters, allowing characters such as \r
, \n
to be parsed and interpreted.
bugs.python.org/issue39603
bugzilla.redhat.com/show_bug.cgi?id=1883870
github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
github.com/urllib3/urllib3/pull/1800
lists.debian.org/debian-lts-announce/2021/06/msg00015.html
usn.ubuntu.com/4570-1/
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2021.html