redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
"https://github.com/pypa/advisory-database/blob/main/vulns/bottle/PYSEC-2016-24.yaml"