First published: Sat Mar 23 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <0:2.7.5-86.el7 | 0:2.7.5-86.el7 |
redhat/python | <0:2.7.5-63.el7_4 | 0:2.7.5-63.el7_4 |
redhat/python | <0:2.7.5-74.el7_5 | 0:2.7.5-74.el7_5 |
redhat/python | <0:2.7.5-83.el7_6 | 0:2.7.5-83.el7_6 |
redhat/python3 | <0:3.6.8-15.1.el8 | 0:3.6.8-15.1.el8 |
redhat/python27-python | <0:2.7.16-6.el6 | 0:2.7.16-6.el6 |
redhat/rh-python36-python | <0:3.6.9-2.el6 | 0:3.6.9-2.el6 |
redhat/python27-python | <0:2.7.16-6.el7 | 0:2.7.16-6.el7 |
redhat/rh-python36-python | <0:3.6.9-2.el7 | 0:3.6.9-2.el7 |
Python Python | >=2.0<2.7.17 | |
Python Python | >=3.5.0<3.5.8 | |
Python Python | >=3.6.0<3.6.9 | |
Python Python | >=3.7.0<3.7.4 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Desktop | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server | =8.0 | |
Redhat Enterprise Linux Server Eus | =8.4 | |
Redhat Enterprise Linux Tus | =8.2 | |
Redhat Enterprise Linux Tus | =8.4 | |
Redhat Enterprise Linux Tus | =8.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Enterprise Linux Workstation | =8.0 | |
debian/python2.7 | 2.7.18-8+deb11u1 |
If your application uses a blacklist to prevent "file://" schema from being used, consider using a whitelist approach to just allow the schemas you want or add "local_file://" schema to your blacklist.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-9948 is a vulnerability in urllib in Python 2.x through 2.7.16 that allows remote attackers to bypass protection mechanisms.
CVE-2019-9948 has a severity rating of 9.1, which is considered critical.
Python 2.x through 2.7.16 is affected by CVE-2019-9948.
Upgrade to a version of Python that is not affected, such as Python 3.0 or later.
You can find more information about CVE-2019-9948 in the references provided: https://bugs.python.org/issue35907, https://github.com/python/cpython/pull/11842, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1695599