PyPi: Urllib3-Future

CVE-2023-45803

Safety vulnerability ID: 61979

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 17, 2023 Updated at Dec 09, 2024
Scan your Python projects for vulnerabilities →

Advisory

Urllib3-future 2.1.902 includes a fix for CVE-2023-45803: Urllib3's request body not stripped after redirect from 303 status changes request method to GET.

Affected package

urllib3-future

Latest version: 2.12.903

urllib3.future is a powerful HTTP 1.1, 2, and 3 client with both sync and async interfaces

Affected versions

Fixed versions

Vulnerability changelog

====================

- Fixed an issue where streaming response did not yield data until the stream was closed.
- Unified peercert/issuercert dict output in ConnectionInfo output format when HTTP/3.
- Made body stripped from HTTP requests changing the request method to GET after HTTP 303 "See Other" redirect responses.
Headers ``content-encoding, content-language, content-location, content-type, content-length, digest, last-modified`` are
also stripped in the said case.
Port of the security fix GHSA-g4mx-q9vg-27p4
- ``_TYPE_BODY`` now accept `Iterable[str]` in addition to `Iterable[bytes]`.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.2

CVSS v3 Details

MEDIUM 4.2
Attack Vector (AV)
ADJACENT_NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
HIGH
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE