|
Message-ID: <CAKG8Do6ip4RSonV48gxBtAFU8X2MEAQUC=j-Giz1fLhtEP1p+A@mail.gmail.com> Date: Fri, 17 Jun 2016 11:22:32 +0200 From: Cedric Buissart <cbuissar@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client Hi Tim, On Wed, Jun 15, 2016 at 6:54 PM, Tim <tim-security@...tinelchicken.org> wrote: > > Here are the additional details I promised: > > http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html > > The gist of it is that protocol injection can occur not only if an > application sets a header based on user-supplied values, but also if > the application ever tries to fetch a URL specified by an attacker > (SSRF case) OR if the application ever accesses any malicious web > server (redirection case). URLs of the following form allow > injection into the HTTP stream: > > http://127.0.0.1%0d%0aX-injected:%20header%0d%0ax-leftover:%20:12345/foo > http://localhost%00%0d%0ax-bar:%20:12345/foo > > More details in the blog post, of course. > Thanks for details! The glibc side of the issue has its own upstream bug entry: https://sourceware.org/bugzilla/show_bug.cgi?id=20018 > > Best regards, > tim > -- Cedric Buissart, Product Security Purkynova 111 Brno 612 45 Czech Republic
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.