Description
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
Remediation
References
Related Vulnerabilities
Apache HTTP Server Improper Access Control Vulnerability (CVE-2016-4979)
WordPress Plugin Homepage SlideShow Arbitrary File Upload (2.3)
Magento Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-7873)
WordPress Plugin YITH Maintenance Mode Cross-Site Scripting (1.3.7)
WordPress Plugin WP-Cron Dashboard Cross-Site Scripting (1.1.5)