First published: Mon Mar 15 2021(Updated: )
### Impact Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext via `proxy_config`. Only the default SSLContext is impacted. ### Patches [urllib3 >=1.26.4 has the issue resolved](https://github.com/urllib3/urllib3/releases/tag/1.26.4). urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies. ### Workarounds Upgrading is recommended as this is a minor release and not likely to break current usage. Configuring an `SSLContext` with `check_hostname=True` and passing via `proxy_config` instead of relying on the default `SSLContext` ### For more information If you have any questions or comments about this advisory: * Email us at [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python urllib3 | >=1.26.0<1.26.4 | |
Fedoraproject Fedora | =34 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.59 | |
IBM Cognos Analytics | <=12.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP2 | |
pip/urllib3 | >=1.26.0<1.26.4 | 1.26.4 |
>=1.26.0<1.26.4 | ||
=34 | ||
=8.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28363 is a vulnerability in the urllib3 library for Python that allows SSL certificate validation to be omitted in some cases involving HTTPS to HTTPS proxies.
The severity of CVE-2021-28363 is medium with a CVSS score of 6.5.
The Python urllib3 library versions 1.26.0 to 1.26.3 are affected by CVE-2021-28363.
Oracle PeopleSoft Enterprise PeopleTools version 8.59 is affected by CVE-2021-28363.
To fix CVE-2021-28363, upgrade to urllib3 version 1.26.4 for Python or a later stable release.