CVE-2018-20060: Exposure of Sensitive Information to an Unauthorized Actor in urllib3
(updated )
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
References
- access.redhat.com/errata/RHSA-2019:2272
- bugzilla.redhat.com/show_bug.cgi?id=1649153
- github.com/advisories/GHSA-www2-v7xj-xrc6
- github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2018-32.yaml
- github.com/urllib3/urllib3
- github.com/urllib3/urllib3/blob/master/CHANGES.rst
- github.com/urllib3/urllib3/commit/560bd227b90f74417ffaedebf5f8d05a8ee4f532
- github.com/urllib3/urllib3/issues/1316
- github.com/urllib3/urllib3/pull/1346
- lists.debian.org/debian-lts-announce/2021/06/msg00015.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ
- nvd.nist.gov/vuln/detail/CVE-2018-20060
- usn.ubuntu.com/3990-1
Detect and mitigate CVE-2018-20060 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →