Логотип exploitDog
bind:"BDU:2021-00373" OR bind:"CVE-2018-20852"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-00373" OR bind:"CVE-2018-20852"

Количество 27

Количество 27

fstec логотип

BDU:2021-00373

почти 6 лет назад

Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2018-20852

почти 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2018-20852

больше 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2018-20852

почти 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-20852

почти 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1989-1

почти 6 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1988-1

почти 6 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2114-1

почти 6 лет назад

Security update for python

EPSS: Низкий
github логотип

GHSA-p5ff-6x75-2mgp

около 3 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4884

больше 5 лет назад

ELSA-2019-4884: python security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4877

больше 5 лет назад

ELSA-2019-4877: python security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4876

больше 5 лет назад

ELSA-2019-4876: python security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2798-1

больше 5 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2091-1

почти 6 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2050-1

почти 6 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14142-1

почти 6 лет назад

Security update for python

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1764

около 5 лет назад

ELSA-2020-1764: python3 security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1132

около 5 лет назад

ELSA-2020-1132: python3 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1131

около 5 лет назад

ELSA-2020-1131: python security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1605

около 5 лет назад

ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-00373

Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
redhat логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1989-1

Security update for python

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1988-1

Security update for python

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2114-1

Security update for python

1%
Низкий
почти 6 лет назад
github логотип
GHSA-p5ff-6x75-2mgp

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2019-4884

ELSA-2019-4884: python security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2019-4877

ELSA-2019-4877: python security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2019-4876

ELSA-2019-4876: python security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2798-1

Security update for python3

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2091-1

Security update for python

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2050-1

Security update for python3

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14142-1

Security update for python

почти 6 лет назад
oracle-oval логотип
ELSA-2020-1764

ELSA-2020-1764: python3 security and bug fix update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1132

ELSA-2020-1132: python3 security update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1131

ELSA-2020-1131: python security update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1605

ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE)

около 5 лет назад

Уязвимостей на страницу