Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. TurboGears
  4. ›
  5. CVE-2019-25101

CVE-2019-25101: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')

February 4, 2023 (updated February 14, 2023)

A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.

References

  • github.com/OnShift/turbogears/commit/f68bbaba47f4474e1da553aa51564a73e1d92a84
  • github.com/OnShift/turbogears/pull/18
  • github.com/OnShift/turbogears/releases/tag/v1.0.11.11
  • github.com/advisories/GHSA-8q38-w56m-qq2c
  • nvd.nist.gov/vuln/detail/CVE-2019-25101
  • vuldb.com/?ctiid.220059
  • vuldb.com/?id.220059

Code Behaviors & Features

Detect and mitigate CVE-2019-25101 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.0.11.11

Fixed versions

  • 1.0.11.11

Solution

Upgrade to version 1.0.11.11 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

Source file

pypi/TurboGears/CVE-2019-25101.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:12 +0000.