Количество 27
Количество 27

CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...

openSUSE-SU-2019:1989-1
Security update for python

openSUSE-SU-2019:1988-1
Security update for python

SUSE-SU-2019:2114-1
Security update for python
GHSA-p5ff-6x75-2mgp
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
ELSA-2019-4884
ELSA-2019-4884: python security update (IMPORTANT)
ELSA-2019-4877
ELSA-2019-4877: python security update (IMPORTANT)
ELSA-2019-4876
ELSA-2019-4876: python security update (IMPORTANT)

BDU:2021-00373
Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

SUSE-SU-2019:2798-1
Security update for python3

SUSE-SU-2019:2091-1
Security update for python

SUSE-SU-2019:2050-1
Security update for python3

SUSE-SU-2019:14142-1
Security update for python
ELSA-2020-1764
ELSA-2020-1764: python3 security and bug fix update (MODERATE)
ELSA-2020-1132
ELSA-2020-1132: python3 security update (MODERATE)
ELSA-2020-1131
ELSA-2020-1131: python security update (MODERATE)
ELSA-2020-1605
ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | больше 6 лет назад |
![]() | CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад |
CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ... | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад | |
![]() | openSUSE-SU-2019:1989-1 Security update for python | 1% Низкий | почти 6 лет назад | |
![]() | openSUSE-SU-2019:1988-1 Security update for python | 1% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:2114-1 Security update for python | 1% Низкий | почти 6 лет назад | |
GHSA-p5ff-6x75-2mgp http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | около 3 лет назад | |
ELSA-2019-4884 ELSA-2019-4884: python security update (IMPORTANT) | больше 5 лет назад | |||
ELSA-2019-4877 ELSA-2019-4877: python security update (IMPORTANT) | больше 5 лет назад | |||
ELSA-2019-4876 ELSA-2019-4876: python security update (IMPORTANT) | больше 5 лет назад | |||
![]() | BDU:2021-00373 Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад |
![]() | SUSE-SU-2019:2798-1 Security update for python3 | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2091-1 Security update for python | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2050-1 Security update for python3 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:14142-1 Security update for python | почти 6 лет назад | ||
ELSA-2020-1764 ELSA-2020-1764: python3 security and bug fix update (MODERATE) | около 5 лет назад | |||
ELSA-2020-1132 ELSA-2020-1132: python3 security update (MODERATE) | около 5 лет назад | |||
ELSA-2020-1131 ELSA-2020-1131: python security update (MODERATE) | около 5 лет назад | |||
ELSA-2020-1605 ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE) | около 5 лет назад |
Уязвимостей на страницу