PyPi: Requests

CVE-2014-1830

Safety vulnerability ID: 39575

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 15, 2014 Updated at Dec 17, 2024
Scan your Python projects for vulnerabilities →

Advisory

Requests before 2.3.0 exposes Authorization or Proxy-Authorization headers on redirect. This fixes CVE-2014-1830.

Affected package

requests

Latest version: 2.32.3

Python HTTP for Humans.

Affected versions

Fixed versions

Vulnerability changelog

++++++++++++++++++ **API Changes** - New ``Response`` property ``is_redirect``, which is true when the library could have processed this response as a redirection (whether or not it actually did). - The ``timeout`` parameter now affects requests with both ``stream=True`` and ``stream=False`` equally. - The change in v2.0.0 to mandate explicit proxy schemes has been reverted. Proxy schemes now default to ``http://``. - The ``CaseInsensitiveDict`` used for HTTP headers now behaves like a normal dictionary when references as string or viewed in the interpreter. **Bugfixes** - No longer expose Authorization or Proxy-Authorization headers on redirect. Fix CVE-2014-1829 and CVE-2014-1830 respectively. - Authorization is re-evaluated each redirect. - On redirect, pass url as native strings. - Fall-back to autodetected encoding for JSON when Unicode detection fails. - Headers set to ``None`` on the ``Session`` are now correctly not sent. - Correctly honor ``decode_unicode`` even if it wasn't used earlier in the same response. - Stop advertising ``compress`` as a supported Content-Encoding. - The ``Response.history`` parameter is now always a list. - Many, many ``urllib3`` bugfixes.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.0

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE