Описание
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.7.15-4ubuntu4~18.04.1 |
cosmic | ignored | end of life |
devel | DNE | |
disco | released | 2.7.16-2ubuntu0.1 |
eoan | not-affected | 2.7.16-3 |
esm-apps/focal | not-affected | 2.7.16-3 |
esm-apps/jammy | not-affected | 2.7.16-3 |
esm-infra-legacy/trusty | not-affected | 2.7.6-8ubuntu0.6+esm2 |
esm-infra/bionic | not-affected | 2.7.15-4ubuntu4~18.04.1 |
esm-infra/xenial | not-affected | 2.7.12-1ubuntu0~16.04.8 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | not-affected | 3.4.3-1ubuntu1~14.04.7+esm2 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | not-affected | 3.5.2-2ubuntu0~16.04.4~14.04.1+esm1 |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | 3.5.2-2ubuntu0~16.04.8 |
focal | DNE | |
groovy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 3.6.8-1~18.04.2 |
cosmic | ignored | end of life |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 3.6.8-1~18.04.2 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | 3.7.3-2 |
cosmic | not-affected | 3.7.3-2 |
devel | DNE | |
disco | not-affected | 3.7.3-2 |
eoan | not-affected | 3.7.3-2 |
esm-apps/bionic | not-affected | 3.7.3-2 |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE |
Показывать по
EPSS
5 Medium
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...
EPSS
5 Medium
CVSS2
5.3 Medium
CVSS3