First published: Wed Mar 18 2015(Updated: )
The `resolve_redirects` function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/requests | >=2.1.0<2.6.0 | 2.6.0 |
Mageia | =4.0 | |
SUSE Python-requests | =2.1.0 | |
SUSE Python-requests | =2.2.1 | |
SUSE Python-requests | =2.3.0 | |
SUSE Python-requests | =2.4.0 | |
SUSE Python-requests | =2.4.1 | |
SUSE Python-requests | =2.4.2 | |
SUSE Python-requests | =2.4.3 | |
SUSE Python-requests | =2.5.0 | |
SUSE Python-requests | =2.5.1 | |
SUSE Python-requests | =2.5.2 | |
SUSE Python-requests | =2.5.3 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Requests | =2.1.0 | |
Requests | =2.2.1 | |
Requests | =2.3.0 | |
Requests | =2.4.0 | |
Requests | =2.4.1 | |
Requests | =2.4.2 | |
Requests | =2.4.3 | |
Requests | =2.5.0 | |
Requests | =2.5.1 | |
Requests | =2.5.2 | |
Requests | =2.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2296 has a medium severity rating due to its potential for session fixation attacks.
To fix CVE-2015-2296, upgrade the requests library to version 2.6.0 or later.
CVE-2015-2296 affects requests library versions 2.1.0 through 2.5.3.
CVE-2015-2296 enables session fixation attacks due to a vulnerability in cookie handling during redirects.
CVE-2015-2296 affects various platforms that use the vulnerable versions of the requests library, including mageia and certain Ubuntu versions.