Safety vulnerability ID: 37071
The information on this page was manually curated by our Cybersecurity Intelligence Team.
[This advisory has been limited. Please create a free account to view the full advisory.]
Latest version: 2.6.2
HTTP library with thread-safe connection pooling, file post, and more.
[This affected versions has been limited. Please create a free account to view the full affected versions.]
[This fixed versions has been limited. Please create a free account to view the full fixed versions.]
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
MISC:https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4: https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application