VYPR

rpm package

suse/python-urllib3&distro=SUSE Manager Server 3.2

pkg:rpm/suse/python-urllib3&distro=SUSE%20Manager%20Server%203.2

Vulnerabilities (7)

  • CVE-2019-11324Apr 18, 2019
    affected < 1.22-3.14.1fixed 1.22-3.14.1

    The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is

  • CVE-2019-11236Apr 15, 2019
    affected < 1.22-3.14.1fixed 1.22-3.14.1

    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.

  • CVE-2019-9740Mar 13, 2019
    affected < 1.22-3.14.1fixed 1.22-3.14.1

    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string

  • CVE-2018-20060Dec 11, 2018
    affected < 1.22-3.14.1fixed 1.22-3.14.1

    urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted i

  • CVE-2018-18074Oct 9, 2018
    affected < 1.22-3.20.1fixed 1.22-3.20.1

    The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.

  • CVE-2016-9015LowJan 11, 2017
    affected < 1.22-3.10.1fixed 1.22-3.10.1

    Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information lea

  • CVE-2015-2296Mar 18, 2015
    affected < 1.22-3.20.1fixed 1.22-3.20.1

    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.