{"api_version":"1","generated_at":"2026-04-27T14:24:07+00:00","cve":"CVE-2020-7695","urls":{"html":"https://cve.report/CVE-2020-7695","api":"https://cve.report/api/cve/CVE-2020-7695.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-7695","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-7695"},"summary":{"title":"CVE-2020-7695","description":"Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.","state":"PUBLIC","assigner":"report@snyk.io","published_at":"2020-07-27 12:15:00","updated_at":"2023-01-31 17:26:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://github.com/encode/uvicorn","name":"https://github.com/encode/uvicorn","refsource":"MISC","tags":["Third Party Advisory"],"title":"GitHub - encode/uvicorn: The lightning-fast ASGI server. ????","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471","name":"https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"HTTP Response Splitting in uvicorn | Snyk","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-7695","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7695","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Everardo Padilla Saca","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"7695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"encode","cpe5":"uvicorn","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"7695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"encode","cpe5":"uvicorn","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"7695","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"encode","cpe5":"uvicorn","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-7695","qid":"980733","title":"Python (pip) Security Update for uvicorn (GHSA-f97h-2pfx-f59f)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"report@snyk.io","DATE_PUBLIC":"2020-07-27T11:23:53.870794Z","ID":"CVE-2020-7695","STATE":"PUBLIC","TITLE":"HTTP Response Splitting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"uvicorn","version":{"version_data":[{"version_affected":">=","version_value":"0"}]}}]},"vendor_name":"n/a"}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"HTTP Response Splitting"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/encode/uvicorn","name":"https://github.com/encode/uvicorn"},{"refsource":"MISC","url":"https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471","name":"https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471"}]},"description":{"description_data":[{"lang":"eng","value":"Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers."}]},"impact":{"cvss":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},"credit":[{"lang":"eng","value":"Everardo Padilla Saca"}]},"nvd":{"publishedDate":"2020-07-27 12:15:00","lastModifiedDate":"2023-01-31 17:26:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:encode:uvicorn:*:*:*:*:*:*:*:*","versionEndExcluding":"0.11.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"7695","Ordinal":"167976","Title":"CVE-2020-7695","CVE":"CVE-2020-7695","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"7695","Ordinal":"1","NoteData":"Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"7695","Ordinal":"2","NoteData":"2020-07-27","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"7695","Ordinal":"3","NoteData":"2020-07-29","Type":"Other","Title":"Modified"}]}}}