gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
https://www.debian.org/security/2018/dsa-4186
https://usn.ubuntu.com/4022-1/
https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html
https://github.com/benoitc/gunicorn/issues/1227
https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5
Published: 2018-04-18
Updated: 2024-11-21
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High
Base Score: 8.7
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: High