A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The patch is named f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
Link | Tags |
---|---|
https://vuldb.com/?id.220059 | third party advisory vdb entry permissions required technical description |
https://vuldb.com/?ctiid.220059 | signature third party advisory permissions required |
https://github.com/OnShift/turbogears/pull/18 | patch issue tracking |
https://github.com/OnShift/turbogears/commit/f68bbaba47f4474e1da553aa51564a73e1d92a84 | patch |
https://github.com/OnShift/turbogears/releases/tag/v1.0.11.11 | patch release notes |