httplib2 is vulnerable to carriage-return line-feed (CRLF) injection. The vulnerability exists as it fails to restrict the characters
, \r
, \n
in the value of URI.
github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e
github.com/httplib2/httplib2/security/advisories/GHSA-gg84-qgv9-w4pq
lists.apache.org/thread.html/r23711190c2e98152cb6f216b95090d5eeb978543bb7e0bad22ce47fc@%3Cissues.beam.apache.org%3E
lists.apache.org/thread.html/r69a462e690b5f2c3d418a288a2c98ae764d58587bd0b5d6ab141f25f@%3Cissues.beam.apache.org%3E
lists.apache.org/thread.html/rad8872fc99f670958c2774e2bf84ee32a3a0562a0c787465cf3dfa23@%3Cissues.beam.apache.org%3E
lists.apache.org/thread.html/rc9eff9572946142b657c900fe63ea4bbd3535911e8d4ce4d08fe4b89@%3Ccommits.allura.apache.org%3E
lists.debian.org/debian-lts-announce/2020/06/msg00000.html
lists.fedoraproject.org/archives/list/[email protected]/message/IXCX2AWROGWGY5GXR7VN3BKF34A2FO6J/
lists.fedoraproject.org/archives/list/[email protected]/message/PZJ3D6JSM7CFZESZZKGUW2VX55BOSOXI/