Insufficiently Protected Credentials Affecting platform-python-pip package, versions <0:9.0.3-16.el8
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Threat Intelligence
EPSS
0.59% (79th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-PLATFORMPYTHONPIP-2041046
- published 26 Jul 2021
- disclosed 29 Jun 2018
Introduced: 29 Jun 2018
CVE-2018-18074 Open this link in a new tabHow to fix?
Upgrade Centos:8
platform-python-pip
to version 0:9.0.3-16.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream platform-python-pip
package and not the platform-python-pip
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
References
- http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
- https://access.redhat.com/security/cve/CVE-2018-18074
- https://bugs.debian.org/910766
- https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
- https://github.com/requests/requests/issues/4716
- https://github.com/requests/requests/pull/4718
- https://access.redhat.com/errata/RHSA-2020:1916
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
- https://usn.ubuntu.com/3790-1/
- https://usn.ubuntu.com/3790-2/
- https://www.oracle.com/security-alerts/cpujul2022.html