Vulnerability Details : CVE-2019-9947
Potential exploit
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
Products affected by CVE-2019-9947
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Threat overview for CVE-2019-9947
Top countries where our scanners detected CVE-2019-9947
Top open port discovered on systems with this issue
80
IPs affected by CVE-2019-9947 205,170
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-9947!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2019-9947
0.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-9947
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2019-9947
-
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9947
-
https://access.redhat.com/errata/RHSA-2019:3725
RHSA-2019:3725 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
[SECURITY] [DLA 1835-1] python3.4 security updateMailing List;Third Party Advisory
-
https://bugs.python.org/issue35906
Exploit;Issue Tracking;Patch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/
[SECURITY] Fedora 29 Update: python3-3.7.3-3.fc29 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://usn.ubuntu.com/4127-2/
USN-4127-2: Python vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/4127-1/
USN-4127-1: Python vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3335
RHSA-2019:3335 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:2030
RHSA-2019:2030 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/06/msg00026.html
[SECURITY] [DLA 1835-2] python3.4 regression updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
[security-announce] openSUSE-SU-2020:0086-1: important: Security updateMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:1260
RHSA-2019:1260 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/02/04/2
oss-security - [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response ValidationMailing List;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20190404-0004/
March 2019 Python Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
[SECURITY] [DLA 1834-1] python2.7 security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
[SECURITY] [DLA 2337-1] python2.7 security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
[security-announce] openSUSE-SU-2019:2393-1: moderate: Security update fMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3520
RHSA-2019:3520 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/202003-26
Python: Multiple vulnerabilities (GLSA 202003-26) — Gentoo securityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
[SECURITY] [DLA 2280-1] python3.5 security updateMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/
[SECURITY] Fedora 30 Update: python3-3.7.3-3.fc30 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
[security-announce] openSUSE-SU-2019:2389-1: moderate: Security update fMailing List;Third Party Advisory
Jump to