rpm package
suse/python-urllib3&distro=SUSE Manager Server 3.2
pkg:rpm/suse/python-urllib3&distro=SUSE%20Manager%20Server%203.2
Vulnerabilities (7)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-11324 | — | < 1.22-3.14.1 | 1.22-3.14.1 | Apr 18, 2019 | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is | ||
| CVE-2019-11236 | — | < 1.22-3.14.1 | 1.22-3.14.1 | Apr 15, 2019 | In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. | ||
| CVE-2019-9740 | — | < 1.22-3.14.1 | 1.22-3.14.1 | Mar 13, 2019 | An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string | ||
| CVE-2018-20060 | — | < 1.22-3.14.1 | 1.22-3.14.1 | Dec 11, 2018 | urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted i | ||
| CVE-2018-18074 | — | < 1.22-3.20.1 | 1.22-3.20.1 | Oct 9, 2018 | The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | ||
| CVE-2016-9015 | Low | 3.7 | < 1.22-3.10.1 | 1.22-3.10.1 | Jan 11, 2017 | Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information lea | |
| CVE-2015-2296 | — | < 1.22-3.20.1 | 1.22-3.20.1 | Mar 18, 2015 | The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect. |
- CVE-2019-11324Apr 18, 2019affected < 1.22-3.14.1fixed 1.22-3.14.1
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is
- CVE-2019-11236Apr 15, 2019affected < 1.22-3.14.1fixed 1.22-3.14.1
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
- CVE-2019-9740Mar 13, 2019affected < 1.22-3.14.1fixed 1.22-3.14.1
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string
- CVE-2018-20060Dec 11, 2018affected < 1.22-3.14.1fixed 1.22-3.14.1
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted i
- CVE-2018-18074Oct 9, 2018affected < 1.22-3.20.1fixed 1.22-3.20.1
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
- affected < 1.22-3.10.1fixed 1.22-3.10.1
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information lea
- CVE-2015-2296Mar 18, 2015affected < 1.22-3.20.1fixed 1.22-3.20.1
The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.