Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-35195

Опубликовано: 20 мая 2024
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests Session, if the first request is made with verify=False to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of verify. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.

An incorrect control flow implementation vulnerability was found in Requests. If the first request in a session is made with verify=False, all subsequent requests to the same host will continue to ignore cert verification.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-670: Always-Incorrect Control Flow Implementation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform's orchestration features, such as liveness and readiness probes, automated pod restarts, and health monitoring, help to quickly detect and recover from service-level failures resulting from incorrect control flows. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Additionally, process isolation ensures that component issues are contained within the originating process, preventing them from affecting other processes or the system as a whole.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certification for Red Hat Enterprise Linux 8redhat-certification-baremetal-containerAffected
Red Hat Certification for Red Hat Enterprise Linux 9redhat-certificationAffected
Red Hat Developer Hubrhdh-operator-containerNot affected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Affected
Red Hat Discoverydiscovery-server-containerNot affected
Red Hat Enterprise Linux 10python-pipNot affected
Red Hat Enterprise Linux 10python-requestsAffected
Red Hat Enterprise Linux 10python-tornadoNot affected
Red Hat Enterprise Linux 6python-requestsOut of support scope
Red Hat Enterprise Linux 7pykickstartOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-670
https://bugzilla.redhat.com/show_bug.cgi?id=2282114requests: subsequent requests to the same host ignore cert verification

EPSS

Процентиль: 3%
0.00018
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 1 года назад

Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.

CVSS3: 5.6
nvd
около 1 года назад

Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.

CVSS3: 5.6
msrc
около 1 года назад

Описание отсутствует

CVSS3: 5.6
debian
около 1 года назад

Requests is a HTTP library. Prior to 2.32.0, when making requests thro ...

suse-cvrf
около 1 года назад

Security update for python-requests

EPSS

Процентиль: 3%
0.00018
Низкий

5.6 Medium

CVSS3