CVE Vulnerabilities

CVE-2020-7695

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Jul 27, 2020 | Modified: Jan 31, 2023
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Uvicorn Encode * 0.11.7 (excluding)
Python-uvicorn Ubuntu groovy *
Python-uvicorn Ubuntu hirsute *
Python-uvicorn Ubuntu impish *
Python-uvicorn Ubuntu kinetic *
Python-uvicorn Ubuntu lunar *
Python-uvicorn Ubuntu mantic *
Python-uvicorn Ubuntu trusty *

Potential Mitigations

References