Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-28363

Опубликовано: 15 мар. 2021
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.

A flaw was found in python-urllib3. SSL certificate validation is omitted in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.

Отчет

  • Red Hat OpenShift Container Platform (OCP) 4 delivers the python-urllib3 package which includes a vulnerable version of urllib3 module, however from OCP 4.6 the python-urllib3 package is no longer shipped. OCP 4.5 is out of support scope for Moderate and Low impact vulnerabilities, hence is marked Out Of Support Scope.
  • Red Hat CodeReady WorkSpaces 2 and Red Hat Gluster Storage 3 are not affected by this flaw because both the products does not ship a vulnerable version of urllib3.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6python-urllib3Not affected
Red Hat Enterprise Linux 7python-pipNot affected
Red Hat Enterprise Linux 7python-urllib3Not affected
Red Hat Enterprise Linux 8python27:2.7/python2-pipNot affected
Red Hat Enterprise Linux 8python27:2.7/python-urllib3Not affected
Red Hat Enterprise Linux 8python38:3.8/python3x-pipNot affected
Red Hat Enterprise Linux 8python38:3.8/python-urllib3Not affected
Red Hat Enterprise Linux 8python39:3.9/python-urllib3Not affected
Red Hat Enterprise Linux 8python-pipNot affected
Red Hat Enterprise Linux 8python-urllib3Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1945136python-urllib3: HTTPS proxy host name not validated when using default SSLContext

EPSS

Процентиль: 29%
0.00107
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 5 лет назад

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.

CVSS3: 6.5
nvd
почти 5 лет назад

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.

CVSS3: 6.5
debian
почти 5 лет назад

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certific ...

CVSS3: 6.5
github
почти 5 лет назад

Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection

CVSS3: 6.5
fstec
почти 5 лет назад

Уязвимость HTTP библиотеки Urllib3 языка программирования Python, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

EPSS

Процентиль: 29%
0.00107
Низкий

6.5 Medium

CVSS3