urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2686-1 | python-urllib3 security update |
Debian DLA |
DLA-3610-1 | python-urllib3 security update |
EUVD |
EUVD-2018-0144 | urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. |
Github GHSA |
GHSA-www2-v7xj-xrc6 | Exposure of Sensitive Information to an Unauthorized Actor in urllib3 |
Ubuntu USN |
USN-3990-1 | urllib3 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-27T16:02:59.523Z
Reserved: 2018-12-11T00:00:00
Link: CVE-2018-20060
No data.
Status : Modified
Published: 2018-12-11T17:29:00.380
Modified: 2024-12-27T16:15:22.593
Link: CVE-2018-20060
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN