First published: Wed Apr 03 2019(Updated: )
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call. Reference: <a href="https://bugs.python.org/issue35907">https://bugs.python.org/issue35907</a> <a href="https://github.com/python/cpython/pull/11842">https://github.com/python/cpython/pull/11842</a>
Affected Software | Affected Version | How to fix |
---|---|---|
urllib3 | <=2.7.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1695570 is considered high due to the potential for remote code execution via local file access.
To fix REDHAT-BUG-1695570, upgrade urllib to version 2.7.17 or later, which addresses this vulnerability.
Users of Python urllib versions up to and including 2.7.16 are affected by REDHAT-BUG-1695570.
The impact of REDHAT-BUG-1695570 allows attackers to bypass file protection mechanisms and access sensitive system files.
Remote attackers can exploit REDHAT-BUG-1695570 to invoke urllib with malicious file URIs, potentially leading to unauthorized data exposure.