vulnerability

Oracle Solaris 11: CVE-2019-9740: Vulnerability in Multiple Components

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Mar 13, 2019
Added
Aug 21, 2019
Modified
Feb 17, 2022

Description

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

Solution(s)

oracle-solaris-11-3-upgrade-library-python-tkinter-27-2-7-16-0-175-3-36-0-26-0oracle-solaris-11-3-upgrade-library-python-tkinter-34-3-4-10-0-175-3-36-0-26-0oracle-solaris-11-3-upgrade-runtime-python-27-2-7-16-0-175-3-36-0-26-0oracle-solaris-11-3-upgrade-runtime-python-27-tests-2-7-16-0-175-3-36-0-26-0oracle-solaris-11-3-upgrade-runtime-python-34-3-4-10-0-175-3-36-0-26-0oracle-solaris-11-4-upgrade-library-python-tkinter-27-2-7-16-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-library-python-tkinter-34-3-4-10-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-library-python-tkinter-35-3-5-7-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-library-python-tkinter-37-3-7-4-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-runtime-python-27-2-7-16-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-runtime-python-27-tests-2-7-16-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-runtime-python-34-3-4-10-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-runtime-python-35-3-5-7-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-runtime-python-37-3-7-4-11-4-12-0-1-3-0oracle-solaris-11-4-upgrade-text-gnu-gettext-0-20-1-11-4-21-0-1-69-0
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.