First published: Fri Jun 29 2018(Updated: )
A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected (302) from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user's valid credentials.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-requests | <0:2.6.0-5.el7 | 0:2.6.0-5.el7 |
redhat/python-pip | <0:9.0.3-7.el7_7 | 0:9.0.3-7.el7_7 |
redhat/python-virtualenv | <0:15.1.0-4.el7_7 | 0:15.1.0-4.el7_7 |
redhat/python-pip | <0:9.0.3-7.el7_8 | 0:9.0.3-7.el7_8 |
redhat/python-virtualenv | <0:15.1.0-4.el7_8 | 0:15.1.0-4.el7_8 |
redhat/python-pip | <0:9.0.3-16.el8 | 0:9.0.3-16.el8 |
Python Requests | <2.20.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/python-requests | <2.20.0 | 2.20.0 |
pip/requests | <=2.19.1 | 2.20.0 |
debian/requests | 2.25.1+dfsg-2 2.28.1+dfsg-1 2.32.3+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2018-18074.
The severity of CVE-2018-18074 is high with a CVSS score of 7.5.
CVE-2018-18074 affects python-requests version up to and excluding 2.20.0.
To fix CVE-2018-18074 in python-requests, upgrade to version 2.20.0 or higher.
More information about CVE-2018-18074 can be found in the references section of the vulnerability report.