CVE-2018-25091
Published: October 15, 2023Last modified: October 16, 2023
Description
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | REQUIRED |
Scope | CHANGED |
Confidentiality | LOW |
Integrity impact | LOW |
Availability impact | NONE |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | py3-urllib3 | Not affected (1.26.12-r1) |
Stream | py3-urllib3 | Not affected (1.26.16-r0) |