Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Jun 2016 09:54:21 -0700
From: Tim <>
Subject: Re: CVE request: Python HTTP header injection in

> Reproducible on all python versions I tested : 2.4, 2.6, 2.7, 3.4 and 3.5
> Fixed branches :
> 3.4 / 3.5 : revision 94952 :
> 2.7 : revision 94951 :

Thank you Cedric!

Here are the additional details I promised:

The gist of it is that protocol injection can occur not only if an
application sets a header based on user-supplied values, but also if
the application ever tries to fetch a URL specified by an attacker
(SSRF case) OR if the application ever accesses any malicious web
server (redirection case).  URLs of the following form allow
injection into the HTTP stream:

More details in the blog post, of course.

Best regards,

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.