PyPi: Urllib3

CVE-2023-43804

Safety vulnerability ID: 61601

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 04, 2023 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Urllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804: Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a 'Cookie' header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f

Affected package

urllib3

Latest version: 2.2.3

HTTP library with thread-safe connection pooling, file post, and more.

Affected versions

Fixed versions

Vulnerability changelog

urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. See CVE-2023-43804.


MISC:https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb: https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
MISC:https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d: https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
MISC:https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f: https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 8.1

CVSS v3 Details

HIGH 8.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE