cvelist/2019/9xxx/CVE-2019-9740.json

202 lines
8.6 KiB
JSON
Raw Normal View History

2019-03-12 23:08:27 -04:00
{
2019-03-18 03:42:33 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9740",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-03-12 23:08:27 -04:00
{
2019-03-18 03:42:33 +00:00
"lang": "eng",
2020-11-02 21:04:24 +00:00
"value": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9."
2019-03-12 23:08:27 -04:00
}
2019-03-18 03:42:33 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
2019-03-19 13:00:42 +00:00
{
"refsource": "BID",
"name": "107466",
"url": "http://www.securityfocus.com/bid/107466"
2019-05-17 03:00:54 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-1ffd6b6064",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/"
2019-05-22 15:00:52 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1260",
"url": "https://access.redhat.com/errata/RHSA-2019:1260"
2019-05-27 05:00:48 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-ec26883852",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/"
2019-06-19 10:00:46 +00:00
},
2019-06-25 06:00:51 +00:00
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html"
2019-06-25 18:00:49 +00:00
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html"
2019-07-12 03:00:46 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-7723d4774a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/"
2019-07-12 08:00:46 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-7df59302e0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/"
2019-08-06 17:00:50 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2030",
"url": "https://access.redhat.com/errata/RHSA-2019:2030"
2019-09-10 16:00:49 +00:00
},
{
"refsource": "UBUNTU",
"name": "USN-4127-2",
"url": "https://usn.ubuntu.com/4127-2/"
2019-09-14 18:00:51 +00:00
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2131",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html"
2019-09-15 00:00:53 +00:00
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2133",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html"
2019-09-18 17:01:00 +00:00
},
{
"refsource": "UBUNTU",
"name": "USN-4127-1",
"url": "https://usn.ubuntu.com/4127-1/"
2019-10-22 07:58:40 +00:00
},
{
"refsource": "BUGTRAQ",
"name": "20191021 [slackware-security] python (SSA:2019-293-01)",
"url": "https://seclists.org/bugtraq/2019/Oct/29"
2019-10-22 19:01:03 +00:00
},
2019-11-06 01:01:23 +00:00
{
"refsource": "REDHAT",
"name": "RHSA-2019:3335",
"url": "https://access.redhat.com/errata/RHSA-2019:3335"
2019-11-06 01:01:43 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3520",
"url": "https://access.redhat.com/errata/RHSA-2019:3520"
2019-11-06 13:01:31 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3725",
"url": "https://access.redhat.com/errata/RHSA-2019:3725"
2019-11-10 01:01:31 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-b06ec6159b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/"
2019-11-10 03:01:01 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-d202cda4f8",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/"
2019-11-11 03:01:32 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-57462fa10d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/"
2020-03-15 19:01:12 +00:00
},
{
"refsource": "GENTOO",
"name": "GLSA-202003-26",
"url": "https://security.gentoo.org/glsa/202003-26"
2020-07-15 12:01:19 +00:00
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html"
2020-08-22 17:01:24 +00:00
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html"
2021-02-04 13:00:48 +00:00
},
2022-07-25 19:01:09 +00:00
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html",
"url": "http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html"
},
2021-02-04 13:00:48 +00:00
{
"refsource": "MLIST",
"name": "[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation",
"url": "http://www.openwall.com/lists/oss-security/2021/02/04/2"
Oracle CPU July 2022 3rd Party CVEs On branch cna/Oracle/CPU2022Jul3rd Changes to be committed: modified: 2014/3xxx/CVE-2014-3643.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2018/18xxx/CVE-2018-18074.json modified: 2018/1xxx/CVE-2018-1259.json modified: 2018/1xxx/CVE-2018-1273.json modified: 2018/1xxx/CVE-2018-1274.json modified: 2018/25xxx/CVE-2018-25032.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2019/0xxx/CVE-2019-0219.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/17xxx/CVE-2019-17495.json modified: 2019/17xxx/CVE-2019-17566.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/20xxx/CVE-2019-20388.json modified: 2019/20xxx/CVE-2019-20916.json modified: 2019/9xxx/CVE-2019-9636.json modified: 2019/9xxx/CVE-2019-9740.json modified: 2020/0xxx/CVE-2020-0404.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11987.json modified: 2020/13xxx/CVE-2020-13974.json modified: 2020/14xxx/CVE-2020-14343.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/1xxx/CVE-2020-1747.json modified: 2020/1xxx/CVE-2020-1927.json modified: 2020/24xxx/CVE-2020-24977.json modified: 2020/25xxx/CVE-2020-25638.json modified: 2020/25xxx/CVE-2020-25649.json modified: 2020/25xxx/CVE-2020-25659.json modified: 2020/26xxx/CVE-2020-26137.json modified: 2020/26xxx/CVE-2020-26184.json modified: 2020/26xxx/CVE-2020-26185.json modified: 2020/26xxx/CVE-2020-26237.json modified: 2020/27xxx/CVE-2020-27619.json modified: 2020/27xxx/CVE-2020-27820.json modified: 2020/28xxx/CVE-2020-28052.json modified: 2020/28xxx/CVE-2020-28491.json modified: 2020/28xxx/CVE-2020-28500.json modified: 2020/29xxx/CVE-2020-29396.json modified: 2020/29xxx/CVE-2020-29505.json modified: 2020/29xxx/CVE-2020-29506.json modified: 2020/29xxx/CVE-2020-29507.json modified: 2020/29xxx/CVE-2020-29508.json modified: 2020/29xxx/CVE-2020-29651.json modified: 2020/35xxx/CVE-2020-35163.json modified: 2020/35xxx/CVE-2020-35164.json modified: 2020/35xxx/CVE-2020-35166.json modified: 2020/35xxx/CVE-2020-35167.json modified: 2020/35xxx/CVE-2020-35168.json modified: 2020/35xxx/CVE-2020-35169.json modified: 2020/35xxx/CVE-2020-35490.json modified: 2020/35xxx/CVE-2020-35491.json modified: 2020/35xxx/CVE-2020-35728.json modified: 2020/36xxx/CVE-2020-36179.json modified: 2020/36xxx/CVE-2020-36180.json modified: 2020/36xxx/CVE-2020-36181.json modified: 2020/36xxx/CVE-2020-36182.json modified: 2020/36xxx/CVE-2020-36183.json modified: 2020/36xxx/CVE-2020-36184.json modified: 2020/36xxx/CVE-2020-36185.json modified: 2020/36xxx/CVE-2020-36186.json modified: 2020/36xxx/CVE-2020-36187.json modified: 2020/36xxx/CVE-2020-36188.json modified: 2020/36xxx/CVE-2020-36189.json modified: 2020/36xxx/CVE-2020-36242.json modified: 2020/36xxx/CVE-2020-36518.json modified: 2020/4xxx/CVE-2020-4788.json modified: 2020/5xxx/CVE-2020-5258.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/7xxx/CVE-2020-7595.json modified: 2020/7xxx/CVE-2020-7656.json modified: 2020/7xxx/CVE-2020-7712.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9492.json modified: 2021/20xxx/CVE-2021-20322.json modified: 2021/21xxx/CVE-2021-21781.json modified: 2021/22xxx/CVE-2021-22118.json modified: 2021/22xxx/CVE-2021-22119.json modified: 2021/22xxx/CVE-2021-22931.json modified: 2021/22xxx/CVE-2021-22939.json modified: 2021/22xxx/CVE-2021-22940.json modified: 2021/22xxx/CVE-2021-22946.json modified: 2021/22xxx/CVE-2021-22947.json modified: 2021/23xxx/CVE-2021-23337.json modified: 2021/23xxx/CVE-2021-23450.json modified: 2021/23xxx/CVE-2021-23926.json modified: 2021/26xxx/CVE-2021-26291.json modified: 2021/29xxx/CVE-2021-29154.json modified: 2021/29xxx/CVE-2021-29425.json modified: 2021/29xxx/CVE-2021-29505.json modified: 2021/29xxx/CVE-2021-29921.json modified: 2021/30xxx/CVE-2021-30129.json modified: 2021/31xxx/CVE-2021-31684.json modified: 2021/31xxx/CVE-2021-31805.json modified: 2021/31xxx/CVE-2021-31811.json modified: 2021/31xxx/CVE-2021-31812.json modified: 2021/33xxx/CVE-2021-33560.json modified: 2021/33xxx/CVE-2021-33813.json modified: 2021/34xxx/CVE-2021-34141.json modified: 2021/34xxx/CVE-2021-34429.json modified: 2021/35xxx/CVE-2021-35043.json modified: 2021/35xxx/CVE-2021-35515.json modified: 2021/35xxx/CVE-2021-35516.json modified: 2021/35xxx/CVE-2021-35517.json modified: 2021/35xxx/CVE-2021-35940.json modified: 2021/36xxx/CVE-2021-36090.json modified: 2021/36xxx/CVE-2021-36373.json modified: 2021/36xxx/CVE-2021-36374.json modified: 2021/37xxx/CVE-2021-37136.json modified: 2021/37xxx/CVE-2021-37137.json modified: 2021/37xxx/CVE-2021-37159.json modified: 2021/37xxx/CVE-2021-37714.json modified: 2021/37xxx/CVE-2021-37750.json modified: 2021/38xxx/CVE-2021-38153.json modified: 2021/38xxx/CVE-2021-38296.json modified: 2021/38xxx/CVE-2021-38604.json modified: 2021/39xxx/CVE-2021-39139.json modified: 2021/39xxx/CVE-2021-39140.json modified: 2021/39xxx/CVE-2021-39141.json modified: 2021/39xxx/CVE-2021-39144.json modified: 2021/39xxx/CVE-2021-39145.json modified: 2021/39xxx/CVE-2021-39146.json modified: 2021/39xxx/CVE-2021-39147.json modified: 2021/39xxx/CVE-2021-39148.json modified: 2021/39xxx/CVE-2021-39149.json modified: 2021/39xxx/CVE-2021-39150.json modified: 2021/39xxx/CVE-2021-39151.json modified: 2021/39xxx/CVE-2021-39152.json modified: 2021/39xxx/CVE-2021-39153.json modified: 2021/39xxx/CVE-2021-39154.json modified: 2021/3xxx/CVE-2021-3177.json modified: 2021/3xxx/CVE-2021-3449.json modified: 2021/3xxx/CVE-2021-3450.json modified: 2021/3xxx/CVE-2021-3517.json modified: 2021/3xxx/CVE-2021-3518.json modified: 2021/3xxx/CVE-2021-3537.json modified: 2021/3xxx/CVE-2021-3572.json modified: 2021/3xxx/CVE-2021-3612.json modified: 2021/3xxx/CVE-2021-3672.json modified: 2021/3xxx/CVE-2021-3737.json modified: 2021/3xxx/CVE-2021-3743.json modified: 2021/3xxx/CVE-2021-3744.json modified: 2021/3xxx/CVE-2021-3749.json modified: 2021/3xxx/CVE-2021-3752.json modified: 2021/3xxx/CVE-2021-3772.json modified: 2021/3xxx/CVE-2021-3773.json modified: 2021/40xxx/CVE-2021-40690.json modified: 2021/41xxx/CVE-2021-41164.json modified: 2021/41xxx/CVE-2021-41165.json modified: 2021/41xxx/CVE-2021-41182.json modified: 2021/41xxx/CVE-2021-41183.json modified: 2021/41xxx/CVE-2021-41184.json modified: 2021/41xxx/CVE-2021-41303.json modified: 2021/41xxx/CVE-2021-41495.json modified: 2021/41xxx/CVE-2021-41496.json modified: 2021/41xxx/CVE-2021-41617.json modified: 2021/41xxx/CVE-2021-41771.json modified: 2021/41xxx/CVE-2021-41772.json modified: 2021/42xxx/CVE-2021-42340.json modified: 2021/42xxx/CVE-2021-42575.json modified: 2021/42xxx/CVE-2021-42739.json modified: 2021/43xxx/CVE-2021-43389.json modified: 2021/43xxx/CVE-2021-43396.json modified: 2021/43xxx/CVE-2021-43797.json modified: 2021/43xxx/CVE-2021-43818.json modified: 2021/43xxx/CVE-2021-43859.json modified: 2021/43xxx/CVE-2021-43976.json modified: 2021/44xxx/CVE-2021-44228.json modified: 2021/44xxx/CVE-2021-44531.json modified: 2021/44xxx/CVE-2021-44532.json modified: 2021/44xxx/CVE-2021-44533.json modified: 2021/44xxx/CVE-2021-44832.json modified: 2021/45xxx/CVE-2021-45046.json modified: 2021/45xxx/CVE-2021-45105.json modified: 2021/45xxx/CVE-2021-45485.json modified: 2021/45xxx/CVE-2021-45486.json modified: 2021/45xxx/CVE-2021-45943.json modified: 2021/4xxx/CVE-2021-4002.json modified: 2021/4xxx/CVE-2021-4083.json modified: 2021/4xxx/CVE-2021-4104.json modified: 2021/4xxx/CVE-2021-4115.json modified: 2021/4xxx/CVE-2021-4157.json modified: 2021/4xxx/CVE-2021-4160.json modified: 2021/4xxx/CVE-2021-4197.json modified: 2021/4xxx/CVE-2021-4203.json modified: 2022/0xxx/CVE-2022-0001.json modified: 2022/0xxx/CVE-2022-0002.json modified: 2022/0xxx/CVE-2022-0286.json modified: 2022/0xxx/CVE-2022-0322.json modified: 2022/0xxx/CVE-2022-0778.json modified: 2022/0xxx/CVE-2022-0839.json modified: 2022/1xxx/CVE-2022-1011.json modified: 2022/1xxx/CVE-2022-1154.json modified: 2022/1xxx/CVE-2022-1292.json modified: 2022/21xxx/CVE-2022-21824.json modified: 2022/22xxx/CVE-2022-22720.json modified: 2022/22xxx/CVE-2022-22721.json modified: 2022/22xxx/CVE-2022-22946.json modified: 2022/22xxx/CVE-2022-22947.json modified: 2022/22xxx/CVE-2022-22963.json modified: 2022/22xxx/CVE-2022-22965.json modified: 2022/22xxx/CVE-2022-22968.json modified: 2022/22xxx/CVE-2022-22969.json modified: 2022/22xxx/CVE-2022-22970.json modified: 2022/22xxx/CVE-2022-22971.json modified: 2022/22xxx/CVE-2022-22976.json modified: 2022/22xxx/CVE-2022-22978.json modified: 2022/23xxx/CVE-2022-23181.json modified: 2022/23xxx/CVE-2022-23218.json modified: 2022/23xxx/CVE-2022-23219.json modified: 2022/23xxx/CVE-2022-23221.json modified: 2022/23xxx/CVE-2022-23302.json modified: 2022/23xxx/CVE-2022-23305.json modified: 2022/23xxx/CVE-2022-23307.json modified: 2022/23xxx/CVE-2022-23308.json modified: 2022/23xxx/CVE-2022-23437.json modified: 2022/23xxx/CVE-2022-23457.json modified: 2022/23xxx/CVE-2022-23632.json modified: 2022/23xxx/CVE-2022-23772.json modified: 2022/23xxx/CVE-2022-23773.json modified: 2022/23xxx/CVE-2022-23806.json modified: 2022/24xxx/CVE-2022-24329.json modified: 2022/24xxx/CVE-2022-24407.json modified: 2022/24xxx/CVE-2022-24728.json modified: 2022/24xxx/CVE-2022-24729.json modified: 2022/24xxx/CVE-2022-24735.json modified: 2022/24xxx/CVE-2022-24736.json modified: 2022/24xxx/CVE-2022-24801.json modified: 2022/24xxx/CVE-2022-24823.json modified: 2022/24xxx/CVE-2022-24839.json modified: 2022/24xxx/CVE-2022-24891.json modified: 2022/25xxx/CVE-2022-25169.json modified: 2022/25xxx/CVE-2022-25636.json modified: 2022/25xxx/CVE-2022-25647.json modified: 2022/25xxx/CVE-2022-25762.json modified: 2022/25xxx/CVE-2022-25845.json modified: 2022/27xxx/CVE-2022-27778.json modified: 2022/29xxx/CVE-2022-29577.json modified: 2022/29xxx/CVE-2022-29824.json modified: 2022/29xxx/CVE-2022-29885.json modified: 2022/30xxx/CVE-2022-30126.json modified: 2022/34xxx/CVE-2022-34169.json
2022-07-19 14:38:32 -07:00
},
{
2022-07-25 19:01:09 +00:00
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "https://bugs.python.org/issue36276",
"refsource": "MISC",
"url": "https://bugs.python.org/issue36276"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190619-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190619-0005/"
2019-03-18 03:42:33 +00:00
}
]
}
}