Description
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2686-1 | python-urllib3 security update |
Debian DLA |
DLA-3610-1 | python-urllib3 security update |
EUVD |
EUVD-2018-0144 | urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. |
Github GHSA |
GHSA-www2-v7xj-xrc6 | Exposure of Sensitive Information to an Unauthorized Actor in urllib3 |
Ubuntu USN |
USN-3990-1 | urllib3 vulnerabilities |
References
History
Fri, 27 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-27T16:02:59.523Z
Reserved: 2018-12-11T00:00:00.000Z
Link: CVE-2018-20060
No data.
Status : Modified
Published: 2018-12-11T17:29:00.380
Modified: 2024-12-27T16:15:22.593
Link: CVE-2018-20060
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN