redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
bottlepy bottle 0.12.10 |
||
debian debian linux 8.0 |