Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Uvicorn | Encode | * | 0.11.7 (excluding) |
Python-uvicorn | Ubuntu | groovy | * |
Python-uvicorn | Ubuntu | hirsute | * |
Python-uvicorn | Ubuntu | impish | * |
Python-uvicorn | Ubuntu | kinetic | * |
Python-uvicorn | Ubuntu | lunar | * |
Python-uvicorn | Ubuntu | mantic | * |
Python-uvicorn | Ubuntu | trusty | * |