Description
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command.
Remediation
References
Related Vulnerabilities
WordPress Plugin Store Locator Plus for WordPress SQL Injection (3.8.6)
MySQL CVE-2022-21256 Vulnerability (CVE-2022-21256)
WordPress Plugin Admin Bar User Switching Cross-Site Scripting (1.0.4)
Oracle Application Server Other Vulnerability (CVE-2002-0565)
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-7491)