An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n followed by an HTTP header or a Redis command. Reference: https://bugs.python.org/issue36276
Created python-urllib3 tracking bugs for this issue: Affects: fedora-all [bug 1688170]
[Deleted]
> Reference: > https://bugs.python.org/issue36276 This has been marked as duplicate of https://bugs.python.org/issue30458
Statement: This issue affects: * All current versions of Red Hat OpenStack Platform. However, version 8 is due to retire on the 20th of April 2019, there are no more planned releases prior to this date.
Created python3 tracking bugs for this issue: Affects: fedora-all [bug 1706851] Created python34 tracking bugs for this issue: Affects: epel-all [bug 1706855] Affects: fedora-all [bug 1706852] Created python35 tracking bugs for this issue: Affects: fedora-all [bug 1706853] Created python36 tracking bugs for this issue: Affects: epel-7 [bug 1706854] Affects: fedora-29 [bug 1706850] Created python37 tracking bugs for this issue: Affects: fedora-28 [bug 1706849]
Upstream patch PR (merged upstream): https://github.com/python/cpython/pull/12755
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:1260
This flaw is about CLRF sequences that are not properly handled in python built-in modules urllib/urllib2 in the *query* part of the url parameter of urlopen() function.
Reference: https://python-security.readthedocs.io/vuln/http-header-injection2.html Upstream patch commits: https://github.com/python/cpython/commit/c4e671eec20dfcb29b18596a89ef075f826c9f96 [master] https://github.com/python/cpython/commit/b7378d77289c911ca6a0c0afaf513879002df7d5 [master] https://github.com/python/cpython/commit/bb8071a4cae5ab3fe321481dd3d73662ffb26052 [python-2.7]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:2030
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3335 https://access.redhat.com/errata/RHSA-2019:3335
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3520 https://access.redhat.com/errata/RHSA-2019:3520
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6 Via RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3725
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2020:1268 https://access.redhat.com/errata/RHSA-2020:1268
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Telco Extended Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Via RHSA-2020:1346 https://access.redhat.com/errata/RHSA-2020:1346
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:1462 https://access.redhat.com/errata/RHSA-2020:1462