Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-25091

Опубликовано: 15 окт. 2023
Источник: redhat
CVSS3: 6.1

Описание

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

A flaw was found in the urllib3 package. Affected versions of this package are vulnerable to information exposure through sent data when the authorization HTTP header is not removed during a cross-origin redirect. An attacker can expose credentials in the authorization header to unintended hosts or transmit them in clear text by exploiting the incomplete fix for CVE-2018-20060.

Отчет

This is only exploitable if a redirect differs in host, port, or scheme. Due to the credential exposure in the authorization header, the confidentiality is highly impacted, but there is no proof that the integrity is affected in any way.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2python-urllib3Affected
Red Hat Certification for Red Hat Enterprise Linux 8redhat-certification-baremetal-containerNot affected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Not affected
Red Hat Enterprise Linux 6python-urllib3Out of support scope
Red Hat Enterprise Linux 7python-pipOut of support scope
Red Hat Enterprise Linux 7python-s3transferOut of support scope
Red Hat Enterprise Linux 7python-urllib3Out of support scope
Red Hat Enterprise Linux 7resource-agentsOut of support scope
Red Hat Enterprise Linux 8inkscape:flatpak/python2-pipNot affected
Red Hat Enterprise Linux 8python27:2.7/python2-pipNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2244340urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 1 года назад

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

CVSS3: 6.1
nvd
больше 1 года назад

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).

CVSS3: 6.1
debian
больше 1 года назад

urllib3 before 1.24.2 does not remove the authorization HTTP header wh ...

CVSS3: 6.1
github
больше 1 года назад

Authorization Header forwarded on redirect

CVSS3: 6.1
fstec
больше 6 лет назад

Уязвимость HTTP библиотеки для Python Urllib3, связанная с использованием открытой переадресации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

6.1 Medium

CVSS3

Уязвимость CVE-2018-25091