`Cookie` HTTP header isn't stripped on cross-origin redirects (CVE-2023-43804)

admin 2023-11-29 20:52:27 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 `Cookie` HTTP header isn't stripped on cross-origin redirects (CVE-2023-43804)

CVE编号

CVE-2023-43804

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-10-05
漏洞描述
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 python urllib3 * Up to (excluding) 1.26.17
运行在以下环境
应用 python urllib3 * From (including) 2.0.0 Up to (excluding) 2.0.6
运行在以下环境
系统 alpine_3.15 py3-urllib3 * Up to (excluding) 1.26.17-r0
运行在以下环境
系统 alpine_3.16 py3-urllib3 * Up to (excluding) 1.26.17-r0
运行在以下环境
系统 alpine_3.17 py3-urllib3 * Up to (excluding) 1.26.17-r0
运行在以下环境
系统 alpine_3.18 py3-urllib3 * Up to (excluding) 1.26.17-r0
运行在以下环境
系统 alpine_edge py3-urllib3 * Up to (excluding) 1.26.17-r0
运行在以下环境
系统 debian debian_linux 10.0 -
运行在以下环境
系统 debian_10 python-urllib3 * Up to (excluding) 1.24.1-1+deb10u1
运行在以下环境
系统 debian_11 python-urllib3 * Up to (including) 1.26.5-1~exp1
运行在以下环境
系统 debian_12 python-urllib3 * Up to (including) 1.26.12-1
运行在以下环境
系统 debian_sid python-urllib3 * Up to (excluding) 1.26.17-1
运行在以下环境
系统 fedora_37 python3-urllib3+brotli * Up to (excluding) 1.26.17-1.fc37
运行在以下环境
系统 fedora_38 python3-urllib3+brotli * Up to (excluding) 1.26.17-1.fc38
运行在以下环境
系统 fedora_39 python3-urllib3+brotli * Up to (excluding) 1.26.18-1.fc39
运行在以下环境
系统 suse_12_SP5 python3-urllib3 * Up to (excluding) 1.25.10-3.34.1
运行在以下环境
系统 unionos_e python-urllib3 * Up to (excluding) python-urllib3-1.25.9-9.uel20
阿里云评分 5.9
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-200 信息暴露
NVD-CWE-noinfo
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0