Insufficiently Protected Credentials Affecting requests package, versions *
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
EPSS
0.59% (79th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-REQUESTS-336483
- published 9 Oct 2018
- disclosed 9 Oct 2018
Introduced: 9 Oct 2018
CVE-2018-18074 Open this link in a new tabHow to fix?
There is no fixed version for Debian:8
requests
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream requests
package and not the requests
package as distributed by Debian
.
See How to fix?
for Debian:8
relevant fixed versions and status.
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
References
- https://security-tracker.debian.org/tracker/CVE-2018-18074
- http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
- https://bugs.debian.org/910766
- https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
- https://github.com/requests/requests/issues/4716
- https://github.com/requests/requests/pull/4718
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
- https://access.redhat.com/errata/RHSA-2019:2035
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-18074
- https://usn.ubuntu.com/3790-1/
- https://usn.ubuntu.com/3790-2/
- https://www.oracle.com/security-alerts/cpujul2022.html