First published: Sun Oct 15 2023(Updated: )
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2018-20060">CVE-2018-20060</a> (which was case-sensitive). <a href="https://github.com/urllib3/urllib3/compare/1.24.1...1.24.2">https://github.com/urllib3/urllib3/compare/1.24.1...1.24.2</a> <a href="https://github.com/urllib3/urllib3/issues/1510">https://github.com/urllib3/urllib3/issues/1510</a> <a href="https://github.com/urllib3/urllib3/commit/adb358f8e06865406d1f05e581a16cbea2136fbc">https://github.com/urllib3/urllib3/commit/adb358f8e06865406d1f05e581a16cbea2136fbc</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python urllib3 | <1.24.2 | |
pip/urllib3 | <1.24.2 | 1.24.2 |
redhat/urllib3 | <1.24.2 | 1.24.2 |
<1.24.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-25091 is medium.
CVE-2018-25091 allows for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext.
To fix CVE-2018-25091, you need to upgrade urllib3 to version 1.24.2 or higher.
You can find more information about CVE-2018-25091 at the following links: [NIST NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-25091), [GitHub Issue](https://github.com/urllib3/urllib3/issues/1510), [GitHub Commit](https://github.com/urllib3/urllib3/commit/adb358f8e06865406d1f05e581a16cbea2136fbc).