漏洞信息详情
Python 注入漏洞
漏洞简介
Python是Python基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。
Python http.client存在注入漏洞。该漏洞源于用户输入构造命令、数据结构或记录的操作过程中,网络系统或产品缺乏对用户输入数据的正确验证,未过滤或未正确过滤掉其中的特殊元素,导致系统或产品产生解析或解释方式错误。以下产品及版本受到影响:Python 3.x系列3.5.10之前版本, 3.6.x系列3.6.12之前版本, 3.7.x系列3.7.9之前版本, 3.8.x系列3.8.5之前版本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://python-security.readthedocs.io/vuln/http-header-injection-method.html
参考网址
来源:MISC
链接:https://bugs.python.org/issue39603
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
来源:GENTOO
链接:https://security.gentoo.org/glsa/202101-18
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20201023-0001/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4581-1/
来源:http-header-injection-method.html
链接:http-header-injection-method.html
来源:MISC
链接:https://python-security.readthedocs.io/vuln/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3614/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163998/Red-Hat-Security-Advisory-2021-3366-01.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052211
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-python-affects-ibm-spectrum-protect-plus-microsoft-file-systems-agent-cve-2020-26116/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4006/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-the-python-docker-and-icp-affect-ibm-spectrum-discover/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1866
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1820
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2711
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159655/Red-Hat-Security-Advisory-2020-4299-01.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-26116
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159650/Red-Hat-Security-Advisory-2020-4273-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0415
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0899
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2956
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0580
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3591/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161767/Ubuntu-Security-Notice-USN-4754-3.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161086/Gentoo-Linux-Security-Advisory-202101-18.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-python-3/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1695
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4216/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2180
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3785/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163276/Red-Hat-Security-Advisory-2021-2543-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-openscale-on-cloud-pak-for-data-is-impacted-by-cve-2020-26116/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021083129
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4237/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2228
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021062703
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021092220
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-cloud-pak-for-security-has-several-security-vulnerabilities-addressed-in-the-latest-version/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4112/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-open-source-python-affects-ibm-tivoli-application-dependency-discovery-manager-cve-2020-26116/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0627
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052042
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6520474
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162638/Red-Hat-Security-Advisory-2021-1761-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163267/Red-Hat-Security-Advisory-2021-2532-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0013/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021062314
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-python-2/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159562/Ubuntu-Security-Notice-USN-4581-1.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-psutil-python-and-golang-affect-ibm-spectrum-protect-plus-container-backup-and-restore-for-kubernetes-and-openshift/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3542/
受影响实体
暂无
补丁
- Python 注入漏洞的修复措施<!--2020-9-27-->
还没有评论,来说两句吧...