Vulnerability Details : CVE-2020-7695
Potential exploit
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
Products affected by CVE-2020-7695
- cpe:2.3:a:encode:uvicorn:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7695
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7695
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
Snyk |
CWE ids for CVE-2020-7695
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-7695
-
https://github.com/encode/uvicorn
GitHub - encode/uvicorn: The lightning-fast ASGI server. 🦄Third Party Advisory
-
https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471
HTTP Response Splitting in uvicorn | SnykExploit;Third Party Advisory
Jump to