Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 17 Jun 2016 11:22:32 +0200
From: Cedric Buissart <cbuissar@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client

Hi Tim,

On Wed, Jun 15, 2016 at 6:54 PM, Tim <tim-security@...tinelchicken.org>
wrote:

>
> Here are the additional details I promised:
>
> http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
>
> The gist of it is that protocol injection can occur not only if an
> application sets a header based on user-supplied values, but also if
> the application ever tries to fetch a URL specified by an attacker
> (SSRF case) OR if the application ever accesses any malicious web
> server (redirection case).  URLs of the following form allow
> injection into the HTTP stream:
>
>   http://127.0.0.1%0d%0aX-injected:%20header%0d%0ax-leftover:%20:12345/foo
>   http://localhost%00%0d%0ax-bar:%20:12345/foo
>
> More details in the blog post, of course.
>

Thanks for details!
The glibc side of the issue has its own upstream bug entry:
https://sourceware.org/bugzilla/show_bug.cgi?id=20018

>
> Best regards,
> tim
>



-- 
Cedric Buissart,
Product Security

Purkynova 111
Brno 612 45
Czech Republic

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.