Описание
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.22-1ubuntu0.18.04.1 |
cosmic | released | 1.22-1ubuntu0.18.10.1 |
devel | not-affected | 1.24-1 |
disco | not-affected | 1.24-1 |
eoan | not-affected | 1.24-1 |
esm-infra-legacy/trusty | needed | |
esm-infra/bionic | not-affected | 1.22-1ubuntu0.18.04.1 |
esm-infra/focal | not-affected | 1.24-1 |
esm-infra/xenial | not-affected | 1.13.1-2ubuntu0.16.04.3 |
focal | not-affected | 1.24-1 |
Показывать по
5 Medium
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
urllib3 before version 1.23 does not remove the Authorization HTTP hea ...
Exposure of Sensitive Information to an Unauthorized Actor in urllib3
Уязвимость модуля urllib3 интерпретатора языка программирования Python, связанная с ошибками управления регистрационными данными, позволяющая нарушителю раскрыть защищаемую информацию
5 Medium
CVSS2
9.8 Critical
CVSS3