[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1413 --- python-virtualenv

ID: oval:org.secpod.oval:def:1700321Date: (C)2020-04-28   (M)2024-04-17
Class: PATCHFamily: unix




urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect . This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user#039;s valid credentials

Platform:
Amazon Linux 2
Product:
python-virtualenv
Reference:
ALAS2-2020-1413
CVE-2018-18074
CVE-2019-11236
CVE-2018-20060
CVE    3
CVE-2018-18074
CVE-2018-20060
CVE-2019-11236
CPE    2
cpe:/a:python:python-virtualenv
cpe:/o:amazon:linux:2

© SecPod Technologies