HTTP response splitting in uvicorn
High severity
GitHub Reviewed
Published
Jul 29, 2020
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Jul 27, 2020
Reviewed
Jul 29, 2020
Published to the GitHub Advisory Database
Jul 29, 2020
Last updated
Feb 1, 2023
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
References