{"alias":[],"description":"CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.","epss":{"percentile":"0.97445","score":"0.417140"},"id":"CVE-2016-5699","metrics":{"cvss2":{"ac_insuf_info":0,"access_complexity":"MEDIUM","access_vector":"NETWORK","authentication":"NONE","availability_impact":"NONE","base_score":4.3,"base_severity":"MEDIUM","confidentiality_impact":"NONE","exploitability_score":8.6,"impact_score":2.9,"integrity_impact":"PARTIAL","obtain_all_privilege":0,"obtain_other_privilege":0,"obtain_user_privilege":0,"user_interaction_required":0,"vector_string":"AV:N\/AC:M\/Au:N\/C:N\/I:P\/A:N","version":"2.0"},"cvss3":{"attack_complexity":"LOW","attack_vector":"NETWORK","availability_impact":"NONE","base_score":6.1,"base_severity":"MEDIUM","confidentiality_impact":"LOW","exploitability_score":2.8,"impact_score":2.7,"integrity_impact":"LOW","privileges_required":"NONE","scope":"CHANGED","user_interaction":"REQUIRED","vector_string":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","version":"3.0"}},"modified":"2026-05-06T22:30:45","nvd_status":"Modified","published":"2016-09-02T14:59:07","score":6.1,"severity":"MEDIUM","source":"secalert@redhat.com","status":"PUBLISHED","weaknesses":[{"id":"CWE-113","name":"Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request\/Response Splitting')","type":"weakness"}]}