CVE Vulnerabilities

CVE-2020-7695

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Jul 27, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
UvicornEncode*0.11.7 (excluding)
Python-uvicornUbuntufocal*
Python-uvicornUbuntugroovy*
Python-uvicornUbuntuhirsute*
Python-uvicornUbuntuimpish*
Python-uvicornUbuntukinetic*
Python-uvicornUbuntulunar*
Python-uvicornUbuntumantic*
Python-uvicornUbuntuoracular*
Python-uvicornUbuntuplucky*
Python-uvicornUbuntutrusty*

Potential Mitigations

References