gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Link | Tags |
---|---|
https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5 | third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html | third party advisory mailing list |
https://github.com/benoitc/gunicorn/issues/1227 | issue tracking exploit third party advisory |
https://www.debian.org/security/2018/dsa-4186 | third party advisory vendor advisory |
https://usn.ubuntu.com/4022-1/ | vendor advisory |