pysec-2018-32
Vulnerability from pysec
Published
2018-12-11 17:29
Modified
2021-06-10 06:51
Details
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
Impacted products
Name | purl |
---|---|
urllib3 | pkg:pypi/urllib3 |
Aliases
{ affected: [ { package: { ecosystem: "PyPI", name: "urllib3", purl: "pkg:pypi/urllib3", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "1.23", }, ], type: "ECOSYSTEM", }, ], versions: [ "0.2", "0.3", "0.3.1", "0.4.0", "0.4.1", "1.0", "1.0.1", "1.0.2", "1.1", "1.10", "1.10.1", "1.10.2", "1.10.3", "1.10.4", "1.11", "1.12", "1.13", "1.13.1", "1.14", "1.15", "1.15.1", "1.16", "1.17", "1.18", "1.18.1", "1.19", "1.19.1", "1.2", "1.2.1", "1.2.2", "1.20", "1.21", "1.21.1", "1.22", "1.3", "1.4", "1.5", "1.6", "1.7", "1.7.1", "1.8", "1.8.2", "1.8.3", "1.9", "1.9.1", ], }, ], aliases: [ "CVE-2018-20060", "GHSA-www2-v7xj-xrc6", ], details: "urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.", id: "PYSEC-2018-32", modified: "2021-06-10T06:51:03.467032Z", published: "2018-12-11T17:29:00Z", references: [ { type: "WEB", url: "https://github.com/urllib3/urllib3/pull/1346", }, { type: "REPORT", url: "https://github.com/urllib3/urllib3/issues/1316", }, { type: "WEB", url: "https://github.com/urllib3/urllib3/blob/master/CHANGES.rst", }, { type: "REPORT", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1649153", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD/", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ/", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT/", }, { type: "WEB", url: "https://usn.ubuntu.com/3990-1/", }, { type: "ADVISORY", url: "https://access.redhat.com/errata/RHSA-2019:2272", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html", }, { type: "ADVISORY", url: "https://github.com/advisories/GHSA-www2-v7xj-xrc6", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.