4.3
CVSSv2

CVE-2020-11078

Published: 20/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.8 | Impact Score: 4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

httplib2 project httplib2

fedoraproject fedora 31

fedoraproject fedora 32

debian debian linux 8.0

Vendor Advisories

Synopsis Low: resource-agents security and bug fix update Type/Severity Security Advisory: Low Topic An update for resource-agents is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Low: resource-agents security and bug fix update Type/Severity Security Advisory: Low Topic An update for resource-agents is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Low: fence-agents security and bug fix update Type/Severity Security Advisory: Low Topic An update for fence-agents is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base sc ...
A flaw was found in python-httplib2 An attacker controlling an unescaped part of uri for `httplib2Httprequest()` could change request headers and body, send additional hidden requests to same server This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with esca ...
In httplib2 before version 0180, an attacker controlling unescaped part of uri for `httplib2Httprequest()` could change request headers and body, send additional hidden requests to same server This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping ...