CVE-2022-0391

A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.10.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.10.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.10.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.10.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.10.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:python:python:3.10.0:alpha6:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire\,_enterprise_sds_\&_hci_storage_node:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

21 Nov 2024, 06:38

Type Values Removed Values Added
References () https://bugs.python.org/issue43882 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://bugs.python.org/issue43882 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html - () https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ -
References () https://security.gentoo.org/glsa/202305-02 - () https://security.gentoo.org/glsa/202305-02 -
References () https://security.netapp.com/advisory/ntap-20220225-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220225-0009/ - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory

Information

Published : 2022-02-09 23:15

Updated : 2024-11-21 06:38


NVD link : CVE-2022-0391

Mitre link : CVE-2022-0391

CVE.ORG link : CVE-2022-0391


JSON object : View

Products Affected

oracle

  • http_server
  • zfs_storage_appliance_kit

netapp

  • hci
  • ontap_select_deploy_administration_utility
  • management_services_for_element_software
  • solidfire\,_enterprise_sds_\&_hci_storage_node
  • active_iq_unified_manager
  • hci_compute_node

python

  • python

fedoraproject

  • fedora
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')