Lucene search

K
githubGitHub Advisory DatabaseGHSA-J6F7-HGHW-G437
HistoryMay 17, 2022 - 3:05 a.m.

bottle.py vulnerable to CRLF Injection

2022-05-1703:05:15
CWE-93
GitHub Advisory Database
github.com
18
bottle.py
crlf injection
web-applications

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

57.6%

bottle.py is a fast and simple micro-framework for python web-applications. redirect() in bottle.py in bottle 0.12.10 doesnโ€™t filter a โ€œ\r\nโ€ sequence, which leads to a CRLF attack, as demonstrated by a redirect(โ€œ233\r\nSet-Cookie: name=saltโ€) call.

Affected configurations

Vulners
Node
bottle-auth_projectbottle-authRange0.10.1โ€“0.12.11
VendorProductVersionCPE
bottle-auth_projectbottle-auth*cpe:2.3:a:bottle-auth_project:bottle-auth:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

57.6%