-
Notifications
You must be signed in to change notification settings - Fork 133
Description
CVE-2018-20060 - High Severity Vulnerability
Vulnerable Library - urllib3-1.21.1-py2.py3-none-any.whl
HTTP library with thread-safe connection pooling, file post, and more.
Library home page: https://files.pythonhosted.org/packages/24/53/f397db567de0aa0e81b211d81c13c41a779f14893e42189cf5bdb97611b2/urllib3-1.21.1-py2.py3-none-any.whl
Path to dependency file: chatbot_ner/requirements.txt
Path to vulnerable library: chatbot_ner/requirements.txt,/datastore
Dependency Hierarchy:
- ❌ urllib3-1.21.1-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: 1dffbf6325ccfcf4a65dbce5276d7cc4cf428abb
Found in base branch: develop
Vulnerability Details
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
Publish Date: 2018-12-11
URL: CVE-2018-20060
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060
Fix Resolution: 1.23
Step up your Open Source Security Game with WhiteSource here