PYSEC-2020-46

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/httplib2/PYSEC-2020-46.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2020-46
Aliases
Published
2020-05-20T16:15:00Z
Modified
2023-11-01T05:18:05.057624Z
Summary
[none]
Details

In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for httplib2.Http.request() could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.

References

Affected packages

PyPI / httplib2

Package

Affected ranges

Type
GIT
Repo
https://github.com/httplib2/httplib2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.18.0

Affected versions

0.*

0.7.0
0.7.1
0.7.2
0.7.3
0.7.4
0.7.5
0.7.6
0.7.7
0.8
0.9
0.9.1
0.9.2
0.10.3
0.11.0
0.11.1
0.11.3
0.12.0
0.12.1
0.12.3
0.13.0
0.13.1
0.14.0
0.15.0
0.16.0
0.17.0
0.17.1
0.17.2
0.17.3
0.17.4