Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-20060

Опубликовано: 26 мар. 2018
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.

Отчет

Red Hat Satellite 6.2 is on Maintenance Support 2 phase, hence only selected critical and important issues will be fixed. Please refer to Red Hat Satellite Product Life Cycle page for more information. In Red Hat OpenStack Platform 13, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP python-urllib3 package.

Меры по смягчению последствий

Use retries=urllib3.Retry(redirect=0) when performing requests if you do not need redirection and handle the redirects manually if you need them.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6python-urllib3Will not fix
Red Hat Enterprise Linux 8python36:3.6/python-virtualenvNot affected
Red Hat Enterprise Linux 8python-urllib3Not affected
Red Hat OpenShift Container Platform 3.10python-urllib3Fix deferred
Red Hat OpenShift Container Platform 3.11python-urllib3Will not fix
Red Hat OpenShift Container Platform 3.6python-urllib3Out of support scope
Red Hat OpenShift Container Platform 3.7python-urllib3Out of support scope
Red Hat OpenShift Container Platform 3.9python-urllib3Fix deferred
Red Hat OpenStack Platform 10 (Newton)python-urllib3Will not fix
Red Hat OpenStack Platform 13 (Queens)python-urllib3Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-522
https://bugzilla.redhat.com/show_bug.cgi?id=1649153python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure

EPSS

Процентиль: 64%
0.00481
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.

CVSS3: 9.8
nvd
больше 6 лет назад

urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.

CVSS3: 9.8
debian
больше 6 лет назад

urllib3 before version 1.23 does not remove the Authorization HTTP hea ...

CVSS3: 9.8
github
больше 6 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in urllib3

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость модуля urllib3 интерпретатора языка программирования Python, связанная с ошибками управления регистрационными данными, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 64%
0.00481
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2018-20060