GHSA-8q38-w56m-qq2c

Suggest an improvement
Source
https://github.com/advisories/GHSA-8q38-w56m-qq2c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-8q38-w56m-qq2c/GHSA-8q38-w56m-qq2c.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-8q38-w56m-qq2c
Aliases
Published
2023-02-04T09:30:21Z
Modified
2023-11-01T04:50:55.324781Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Header injection in TurboGears
Details

A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.

Database specific
{
    "nvd_published_at": "2023-02-04T08:15:00Z",
    "cwe_ids": [
        "CWE-113",
        "CWE-436"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-02-14T21:26:39Z"
}
References

Affected packages

PyPI / turbogears

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.11.11

Affected versions

0.*

0.5.0
0.8.8
0.8.9

1.*

1.0.1
1.0.2
1.0.2.1
1.0.2.2
1.0.3
1.0.3.2
1.0.3.3
1.0.4
1.0.4.1
1.0.4.2
1.0.4.3
1.0.4.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10