First published: Mon Oct 02 2023(Updated: )
urllib3 could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw with cookie request header not stripped during cross-origin redirects. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python urllib3 | <1.26.17 | |
Python urllib3 | >=2.0.0<2.0.6 | |
Debian Debian Linux | =10.0 | |
pip/urllib3 | <1.26.17 | 1.26.17 |
pip/urllib3 | >=2.0.0<2.0.6 | 2.0.6 |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
IBM SOAR QRadar Plugin App | <=1.0 - 5.0.3 | |
redhat/urllib3 | <2.0.6 | 2.0.6 |
redhat/urllib3 | <1.26.17 | 1.26.17 |
<1.26.17 | ||
>=2.0.0<2.0.6 | ||
=10.0 | ||
=37 | ||
=38 | ||
=39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-43804.
The severity of CVE-2023-43804 is medium with a severity value of 5.9.
urllib3 versions up to 1.26.17 and versions up to 2.0.6 are affected by CVE-2023-43804.
To fix CVE-2023-43804, you should update urllib3 to version 1.26.17 or version 2.0.6.
You can find more information about CVE-2023-43804 at the following references: [GitHub Advisory](https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f), [GitHub Commit 1](https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb), [GitHub Commit 2](https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d).