Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. uvicorn
  4. ›
  5. CVE-2020-7694

CVE-2020-7694: Log injection in uvicorn

July 29, 2020 (updated November 18, 2024)

This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it’s been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn’s access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that’s displaying the logs (either in real time or from a file).

References

  • github.com/advisories/GHSA-33c7-2mpw-hg34
  • github.com/encode/uvicorn
  • github.com/encode/uvicorn/commit/895807f94ea9a8e588605c12076b7d7517cda503
  • github.com/encode/uvicorn/issues/723
  • github.com/pypa/advisory-database/tree/main/vulns/uvicorn/PYSEC-2020-150.yaml
  • nvd.nist.gov/vuln/detail/CVE-2020-7694
  • snyk.io/vuln/SNYK-PYTHON-UVICORN-575560

Code Behaviors & Features

Detect and mitigate CVE-2020-7694 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.11.7

Fixed versions

  • 0.11.7

Solution

Upgrade to version 0.11.7 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-116: Improper Encoding or Escaping of Output
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

pypi/uvicorn/CVE-2020-7694.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.