PYSEC-2016-24

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/bottle/PYSEC-2016-24.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2016-24
Aliases
Published
2016-12-16T09:59:00Z
Modified
2023-11-01T05:43:04.130077Z
Summary
[none]
Details

redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.

References

Affected packages

PyPI / bottle

Package

Affected ranges

Type
GIT
Repo
https://github.com/bottlepy/bottle
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0.10.1
Fixed
0.12.11

Affected versions

0.*

0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.10.6
0.10.7
0.10.8
0.10.9
0.10.10
0.10.11
0.10.12
0.11.1
0.11.2
0.11.3
0.11.4
0.11.5
0.11.6
0.11.7
0.12.1
0.12.2
0.12.3
0.12.4
0.12.5
0.12.6
0.12.7
0.12.8
0.12.9
0.12.10