CVE-2023-43804

high

Description

urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.

References

https://lists.fedoraproject.org/archives/list/[email protected]/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/

https://lists.fedoraproject.org/archives/list/[email protected]/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/

https://lists.fedoraproject.org/archives/list/[email protected]/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/

https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html

https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f

https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d

https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb

Details

Source: Mitre, NVD

Published: 2023-10-04

Updated: 2024-02-01

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

Severity: High

CVSS v3

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Severity: High