urllib3 Python Library < 1.26.19, < 2.2.2 (CVE-2024-37891)

medium Nessus Plugin ID 200807

Synopsis

A Python library installed on the remote host is affected by a vulnerability.

Description

urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with 'ProxyManager', the 'Proxy-Authorization' header is only sent to the configured proxy, as expected. However, when sending HTTP requests without using urllib3's proxy support, it's possible to accidentally configure the 'Proxy-Authorization' header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the 'Proxy-Authorization' HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to urllib3 version 1.26.19, 2.2.2 or later.

See Also

http://www.nessus.org/u?7b44847c

Plugin Details

Severity: Medium

ID: 200807

File Name: urllib3_python_lib_2_2_2.nasl

Version: 1.15

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 6/21/2024

Updated: 1/8/2026

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

CVSS Score Source: CVE-2024-37891

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:python:urllib3

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/17/2024

Vulnerability Publication Date: 6/17/2024

Reference Information

CVE: CVE-2024-37891

IAVA: 2024-A-0363