Description
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command.
Remediation
References
Related Vulnerabilities
Drupal Core 4.7.x Cross-Site Scripting (4.7.0 - 4.7.1)
WordPress Plugin Properties and Agents-Real Estate Manager Cross-Site Scripting (6.7.1)
Django Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-6188)
Tornado Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2014-9720)