Miggo Logo

CVE-2020-11078: CRLF injection in httplib2

6.8

CVSS Score
3.1

Basic Information

EPSS Score
0.8645%
Published
5/20/2020
Updated
9/20/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
httplib2pip< 0.18.00.18.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the request method's handling of URI parameters before the security patch. The commit diff shows critical sanitization (replacing CR/LF/space with %-encodings) was added directly in the request method's flow. The advisory explicitly references httplib2.Http.request() as the entry point, and the CWE-93 classification matches the CRLF injection via unescaped URI components. The vulnerable pattern occurs when URIs are constructed via string concatenation rather than proper URL building utilities.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *tt**k*r *ontrollin* un*s**p** p*rt o* uri *or `*ttpli**.*ttp.r*qu*st()` *oul* ***n** r*qu*st *****rs *n* *o*y, s*n* ***ition*l *i***n r*qu*sts to s*m* s*rv*r. Imp**ts so*tw*r* t**t us*s *ttpli** wit* uri *onstru*t** *y strin* *on**t*n*ti

Reasoning

T** vuln*r**ility st*ms *rom t** r*qu*st m*t*o*'s **n*lin* o* URI p*r*m*t*rs ***or* t** s**urity p*t**. T** *ommit *i** s*ows *riti**l s*nitiz*tion (r*pl**in* *R/L*/sp*** wit* %-*n*o*in*s) w*s ***** *ir**tly in t** r*qu*st m*t*o*'s *low. T** **visory