CVE-2020-11078: CRLF injection in httplib2
6.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.8645%
CWE
Published
5/20/2020
Updated
9/20/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
httplib2 | pip | < 0.18.0 | 0.18.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the request method's handling of URI parameters before the security patch. The commit diff shows critical sanitization (replacing CR/LF/space with %-encodings) was added directly in the request method's flow. The advisory explicitly references httplib2.Http.request()
as the entry point, and the CWE-93 classification matches the CRLF injection via unescaped URI components. The vulnerable pattern occurs when URIs are constructed via string concatenation rather than proper URL building utilities.