cvelist/2016/5xxx/CVE-2016-5699.json
2019-03-17 21:43:29 +00:00

147 lines
5.6 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-5699",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.splunk.com/view/SP-CAAAPUE",
"refsource": "CONFIRM",
"url": "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name": "https://hg.python.org/cpython/rev/1c45047c5102",
"refsource": "CONFIRM",
"url": "https://hg.python.org/cpython/rev/1c45047c5102"
},
{
"name": "RHSA-2016:1630",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1630.html"
},
{
"name": "RHSA-2016:1627",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1627.html"
},
{
"name": "https://hg.python.org/cpython/rev/bf3e1c9b80e9",
"refsource": "CONFIRM",
"url": "https://hg.python.org/cpython/rev/bf3e1c9b80e9"
},
{
"name": "RHSA-2016:1629",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1629.html"
},
{
"name": "http://www.splunk.com/view/SP-CAAAPSV",
"refsource": "CONFIRM",
"url": "http://www.splunk.com/view/SP-CAAAPSV"
},
{
"name": "[oss-security] 20160616 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/16/2"
},
{
"name": "[debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS",
"refsource": "CONFIRM",
"url": "https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS"
},
{
"name": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4",
"refsource": "CONFIRM",
"url": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4"
},
{
"name": "[oss-security] 20160615 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/15/12"
},
{
"name": "http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html",
"refsource": "MISC",
"url": "http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html"
},
{
"name": "[oss-security] 20160614 CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/14/7"
},
{
"name": "91226",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91226"
},
{
"name": "RHSA-2016:1628",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1628.html"
},
{
"name": "RHSA-2016:1626",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1626.html"
}
]
}
}