CVE Vulnerabilities

CVE-2019-11236

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Apr 15, 2019 | Modified: Nov 07, 2023
CVSS 3.x
6.1
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM

In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

Name Vendor Start Version End Version
Urllib3 Python * 1.24.2 (including)
Red Hat Ansible Tower 3.5 for RHEL 7 RedHat ansible-tower-35/ansible-tower:3.5.6-1 *
Red Hat Ansible Tower 3.6 for RHEL 7 RedHat ansible-tower-36/ansible-tower:3.6.4-1 *
Red Hat Enterprise Linux 7 RedHat python-urllib3-0:1.10.2-7.el7 *
Red Hat Enterprise Linux 7 RedHat python-pip-0:9.0.3-7.el7_7 *
Red Hat Enterprise Linux 7 RedHat python-virtualenv-0:15.1.0-4.el7_7 *
Red Hat Enterprise Linux 7 RedHat python-pip-0:9.0.3-7.el7_8 *
Red Hat Enterprise Linux 7 RedHat python-virtualenv-0:15.1.0-4.el7_8 *
Red Hat Enterprise Linux 8 RedHat python27:2.7-8010020190903182548.51c94b97 *
Red Hat Enterprise Linux 8 RedHat python27:2.7-8020020200117110429.90f98d4f *
Red Hat Enterprise Linux 8 RedHat python-pip-0:9.0.3-16.el8 *
Red Hat Enterprise Linux 8 RedHat python-urllib3-0:1.24.2-2.el8 *
Red Hat Enterprise Linux 8 RedHat python-pip-0:9.0.3-16.el8 *
Red Hat OpenShift Container Platform 4.3 RedHat python-urllib3-0:1.24.3-1.el7 *
Red Hat OpenShift Container Platform 4.4 RedHat python-urllib3-0:1.24.3-1.el7 *
Python-urllib3 Ubuntu bionic *
Python-urllib3 Ubuntu cosmic *
Python-urllib3 Ubuntu devel *
Python-urllib3 Ubuntu disco *
Python-urllib3 Ubuntu trusty *
Python-urllib3 Ubuntu trusty/esm *
Python-urllib3 Ubuntu upstream *
Python-urllib3 Ubuntu xenial *

Potential Mitigations

References