中危 urllib3中的CRLF注射

CVE编号

CVE-2019-9740

利用情况

暂无

补丁情况

官方补丁

披露时间

2019-03-13
漏洞描述
在Python 2.x到2.7.16中的urllib2和Python 3.x到3.7.2中的urllib中发现了一个问题。如果攻击者控制url参数,则可以进行CRLF注入,如urllib.request.urlopen的第一个参数所示,其中\ r \ n后跟HTTP标头或Redis命令。<br>
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:
https://www.python.org
参考链接
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html
http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-pytho...
http://www.openwall.com/lists/oss-security/2021/02/04/2
http://www.securityfocus.com/bid/107466
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3335
https://access.redhat.com/errata/RHSA-2019:3520
https://access.redhat.com/errata/RHSA-2019:3725
https://bugs.python.org/issue36276
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://seclists.org/bugtraq/2019/Oct/29
https://security.gentoo.org/glsa/202003-26
https://security.netapp.com/advisory/ntap-20190619-0005/
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpujul2022.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 python python * From
(including)
2.0
Up to
(including)
2.7.16
运行在以下环境
应用 python python * From
(including)
3.0.0
Up to
(including)
3.7.2
运行在以下环境
系统 alibaba_cloud_linux_2.1903 python * Up to
(excluding)
2.7.5-86.1.al7
运行在以下环境
系统 alibaba_cloud_linux_3 python-urllib3 * Up to
(excluding)
1.24.2-4.1.al8
运行在以下环境
系统 amazon_2 python3 * Up to
(excluding)
3.7.3-1.amzn2.0.2
运行在以下环境
系统 amazon_AMI python36 * Up to
(excluding)
3.6.8-1.13.amzn1
运行在以下环境
系统 anolis_os_7 python * Up to
(excluding)
2.7.5-90
运行在以下环境
系统 anolis_os_8 python3 * Up to
(excluding)
3.6.8-47.0.1
运行在以下环境
系统 centos_7 python * Up to
(excluding)
2.7.5-86.el7
运行在以下环境
系统 debian_10 python2.7 * Up to
(excluding)
2.7.16-2+deb10u1
运行在以下环境
系统 debian_11 python2.7 * Up to
(excluding)
2.7.16-3
运行在以下环境
系统 debian_8 python2.7 * Up to
(excluding)
2.7.9-2+deb8u2
运行在以下环境
系统 debian_9 python2.7 * Up to
(excluding)
2.7.13-2+deb9u4
运行在以下环境
系统 fedora_29 python3 * Up to
(excluding)
3.7.3-3.fc29
运行在以下环境
系统 fedora_30 python3 * Up to
(excluding)
3.7.3-3.fc30
运行在以下环境
系统 fedora_31 python35 * Up to
(excluding)
3.5.8-2.fc31
运行在以下环境
系统 fedora_EPEL_6 python34 * Up to
(excluding)
3.4.10-4.el6
运行在以下环境
系统 fedora_EPEL_7 python34 * Up to
(excluding)
3.4.10-4.el7
运行在以下环境
系统 opensuse_Leap_15.0 python3-urllib3 * Up to
(excluding)
1.22-lp150.5.3.1
运行在以下环境
系统 opensuse_Leap_15.1 python3-urllib3 * Up to
(excluding)
1.24-lp151.2.3.1
运行在以下环境
系统 oracle_7 python * Up to
(excluding)
2.7.5-86.0.1.el7
运行在以下环境
系统 oracle_8 python3-libs * Up to
(excluding)
3.6.8-15.1.0.1.el8
运行在以下环境
系统 redhat_7 python * Up to
(excluding)
2.7.5-86.el7
运行在以下环境
系统 redhat_8 python3-idle * Up to
(excluding)
3.6.8-15.1.el8
运行在以下环境
系统 rocky_linux_8 python-dns * Up to
(excluding)
4.2.3-3.el8
运行在以下环境
系统 ubuntu_16.04 python2.7 * Up to
(excluding)
3.5.2-2ubuntu0~16.04.8
阿里云评分
4.9
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-93 对CRLF序列的转义处理不恰当(CRLF注入)
阿里云安全产品覆盖情况