{"id":"CVE-2020-26137","details":"urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.","aliases":["GHSA-wqvq-5m8c-6g24","PYSEC-2020-148"],"modified":"2026-04-15T23:59:09.660543018Z","published":"2020-09-30T18:15:26.773Z","related":["ALSA-2021:1631","ALSA-2021:1761","SUSE-FU-2022:0444-1","SUSE-FU-2022:0445-1","SUSE-SU-2020:3309-1","SUSE-SU-2020:3624-1","SUSE-SU-2020:3723-1","SUSE-SU-2020:3897-1","SUSE-SU-2021:2817-1","SUSE-SU-2021:3251-1","openSUSE-SU-2020:2237-1","openSUSE-SU-2020:2282-1","openSUSE-SU-2021:1206-1","openSUSE-SU-2021:2817-1","openSUSE-SU-2024:13212-1","openSUSE-SU-2024:13213-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"22.2.0"}],"cpe":"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.8"}],"cpe":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"20.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4570-1/"},{"type":"REPORT","url":"https://bugs.python.org/issue39603"},{"type":"FIX","url":"https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b"},{"type":"FIX","url":"https://github.com/urllib3/urllib3/pull/1800"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/urllib3/urllib3","events":[{"introduced":"0"},{"fixed":"21758b0694ea53b499e832a993e8d1ada01135b2"},{"fixed":"1dd69c5c5982fae7c87a620d487c2ebf7a6b436b"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.25.9"}],"cpe":"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["0.3","0.3.1","0.4","0.4.1","1.1","1.2","1.2.1","1.25","1.25.1","1.25.2","1.25.3","1.25.4","1.25.5","1.25.6","1.25.7","1.25.8","1.3","1.4","1.5","1.6","1.7","1.7.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26137.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}