CVE-2019-11324: Improper Certificate Validation in urllib3
(updated )
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context
, ca_certs
, or ca_certs_dir
argument.
References
- access.redhat.com/errata/RHSA-2019:3335
- access.redhat.com/errata/RHSA-2019:3590
- github.com/advisories/GHSA-mh33-7rrq-662w
- github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2019-133.yaml
- github.com/urllib3/urllib3
- github.com/urllib3/urllib3/commit/1efadf43dc63317cd9eaa3e0fdb9e05ab07254b1
- github.com/urllib3/urllib3/compare/a6ec68a...1efadf4
- lists.debian.org/debian-lts-announce/2021/06/msg00015.html
- lists.debian.org/debian-lts-announce/2023/10/msg00012.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2
- nvd.nist.gov/vuln/detail/CVE-2019-11324
- pypi.org/project/urllib3/1.24.2
- usn.ubuntu.com/3990-1
Detect and mitigate CVE-2019-11324 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →