CVE-2019-18348
|
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
Published:
October 23, 2019; 01:15:12 PM -04:00
|
V3.1: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-16935
|
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
Published:
September 27, 2019; 10:15:10 PM -04:00
|
V3.1: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-16056
|
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
Published:
September 06, 2019; 02:15:15 PM -04:00
|
V3.1: 7.5 HIGH
V2: 5.0 MEDIUM
|
CVE-2018-20852
|
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
Published:
July 13, 2019; 05:15:10 PM -04:00
|
V3.0: 5.3 MEDIUM
V2: 5.0 MEDIUM
|
CVE-2019-9947
|
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.
Published:
March 23, 2019; 02:29:02 PM -04:00
|
V3.0: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-9740
|
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command.
Published:
March 12, 2019; 11:29:00 PM -04:00
|
V3.0: 6.1 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2019-9636
|
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly.
Published:
March 08, 2019; 04:29:00 PM -05:00
|
V3.0: 9.8 CRITICAL
V2: 5.0 MEDIUM
|
CVE-2018-20406
|
Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data.
Published:
December 23, 2018; 06:29:00 PM -05:00
|
V3.0: 7.5 HIGH
V2: 5.0 MEDIUM
|
CVE-2018-14647
|
Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. Python 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 are believed to be vulnerable.
Published:
September 24, 2018; 08:29:00 PM -04:00
|
V3.0: 7.5 HIGH
V2: 5.0 MEDIUM
|
CVE-2018-1061
|
python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.
Published:
June 19, 2018; 08:29:00 AM -04:00
|
V3.0: 7.5 HIGH
V2: 5.0 MEDIUM
|
CVE-2009-3720
|
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
Published:
November 03, 2009; 11:30:12 AM -05:00
|
V2: 5.0 MEDIUM
|
CVE-2009-2940
|
The pygresql module 3.8.1 and 4.0 for Python does not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
Published:
October 22, 2009; 12:30:00 PM -04:00
|
V2: 7.5 HIGH
|