vulnerability

Amazon Linux AMI 2: CVE-2019-9947: Security patch for python3 (ALAS-2019-1247)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Mar 23, 2019
Added
Apr 27, 2020
Modified
Nov 27, 2024

Description

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

Solution(s)

amazon-linux-ami-2-upgrade-python3amazon-linux-ami-2-upgrade-python3-debugamazon-linux-ami-2-upgrade-python3-debuginfoamazon-linux-ami-2-upgrade-python3-develamazon-linux-ami-2-upgrade-python3-libsamazon-linux-ami-2-upgrade-python3-testamazon-linux-ami-2-upgrade-python3-tkinteramazon-linux-ami-2-upgrade-python3-tools
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.