SB2020092711 - Multiple vulnerabilities in Python
Published: September 27, 2020 Updated: June 3, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) CRLF injection (CVE-ID: CVE-2020-26116)
The vulnerability allows a remote attacker to inject arbitrary data in server response.
The vulnerability exists due to insufficient validation of attacker-supplied data in "http.client". A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior.
2) Untrusted search path (CVE-ID: CVE-2020-15801)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
- https://bugs.python.org/issue39603
- https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
- https://python-security.readthedocs.io/vuln/http-header-injection-method.html
- https://security.netapp.com/advisory/ntap-20201023-0001/
- https://usn.ubuntu.com/4581-1/
- https://bugs.python.org/issue41304
- https://github.com/python/cpython/pull/21495
- https://security.netapp.com/advisory/ntap-20200731-0003/