Description
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command.
Remediation
References
Related Vulnerabilities
WordPress Plugin Contact Form by Supsystic Cross-Site Scripting (1.7.19)
Apache 2.x version older than 2.0.61
WordPress Plugin Dropshix Security Bypass (4.0.13)
Ruby on Rails Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-0449)
WebLogic Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)