First published: Mon Jun 03 2019(Updated: )
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <0:2.7.5-80.el7_6 | 0:2.7.5-80.el7_6 |
redhat/python27-python | <0:2.7.16-6.el6 | 0:2.7.16-6.el6 |
redhat/python27-python | <0:2.7.16-6.el7 | 0:2.7.16-6.el7 |
redhat/imgbased | <0:1.1.9-0.1.el7e | 0:1.1.9-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.5-0.20190717.0.el7e | 0:4.3.5-0.20190717.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.5-2.el7e | 0:4.3.5-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.5-20190722.0.el7_7 | 0:4.3.5-20190722.0.el7_7 |
Python Python | >=2.7.0<2.7.17 | |
Python Python | >=3.5.0<3.5.8 | |
Python Python | >=3.6.0<3.6.9 | |
Python Python | >=3.7.0<3.7.4 | |
Python Python | =3.8.0-alpha4 | |
Python Python | =3.8.0-beta1 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.6 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 | |
Netapp Cloud Backup | ||
Netapp Converged Systems Advisor Agent | ||
ubuntu/python2.7 | <2.7.6-8ubuntu0.6+ | 2.7.6-8ubuntu0.6+ |
ubuntu/python2.7 | <2.7.15-4ubuntu4~18.04.1 | 2.7.15-4ubuntu4~18.04.1 |
ubuntu/python2.7 | <2.7.16-2ubuntu0.1 | 2.7.16-2ubuntu0.1 |
ubuntu/python2.7 | <2.7.12-1ubuntu0~16.04.8 | 2.7.12-1ubuntu0~16.04.8 |
ubuntu/python3.4 | <3.4.3-1ubuntu1~14.04.7+ | 3.4.3-1ubuntu1~14.04.7+ |
ubuntu/python3.5 | <3.5.2-2ubuntu0~16.04.8 | 3.5.2-2ubuntu0~16.04.8 |
ubuntu/python3.6 | <3.6.8-1~18.04.2 | 3.6.8-1~18.04.2 |
ubuntu/python3.7 | <3.7.3-2ubuntu0.1 | 3.7.3-2ubuntu0.1 |
All of | ||
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 | |
debian/python2.7 | 2.7.16-2+deb10u1 2.7.16-2+deb10u4 2.7.18-8+deb11u1 | |
debian/python3.7 | 3.7.3-2+deb10u3 3.7.3-2+deb10u7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10160 is a security regression vulnerability in Python, affecting versions 2.7, 3.5, 3.6, 3.7, and from v3.8.0a4 through v3.8.0b1.
CVE-2019-10160 has a severity rating of 9.8 (Critical).
CVE-2019-10160 affects Python versions 2.7, 3.5, 3.6, 3.7, and from v3.8.0a4 through v3.8.0b1.
CVE-2019-10160 can be exploited by abusing the user and password parts of a URL.
Yes, remediation steps are available. Please refer to the provided references for more information.