Safety vulnerability ID: 37071
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of urllib3 are vulnerable Improper Certificate Validation. Urllib3 mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to the use of the ssl_context, ca_certs, or ca_certs_dir argument.
Latest version: 2.2.3
HTTP library with thread-safe connection pooling, file post, and more.
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
MISC:https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4: https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application