{"id":"BIT-python-2020-26116","details":"http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.","aliases":["BIT-libpython-2020-26116","BIT-python-min-2020-26116","CVE-2020-26116","PSF-2020-5"],"modified":"2025-08-11T14:44:34.234527Z","published":"2024-03-06T11:07:36.585Z","database_specific":{"cpes":["cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html"},{"type":"WEB","url":"https://bugs.python.org/issue39603"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/"},{"type":"WEB","url":"https://python-security.readthedocs.io/vuln/http-header-injection-method.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202101-18"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20201023-0001/"},{"type":"WEB","url":"https://usn.ubuntu.com/4581-1/"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26116"}],"affected":[{"package":{"name":"python","ecosystem":"Bitnami","purl":"pkg:bitnami/python"},"ranges":[{"type":"SEMVER","events":[{"introduced":"3.0.0"},{"fixed":"3.5.10"},{"introduced":"3.6.0"},{"fixed":"3.6.12"},{"introduced":"3.7.0"},{"fixed":"3.7.9"},{"introduced":"3.8.0"},{"fixed":"3.8.5"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/python/BIT-python-2020-26116.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"}]}],"schema_version":"1.7.3"}