Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2024.0347
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2024-0347)
Zusammenfassung:The remote host is missing an update for the 'python-urllib3' package(s) announced via the MGASA-2024-0347 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'python-urllib3' package(s) announced via the MGASA-2024-0347 advisory.

Vulnerability Insight:
When using urllib3's proxy support with ProxyManager, the
Proxy-Authorization header is only sent to the configured proxy, as
expected.
However, when sending HTTP requests without using urllib3's proxy
support, it's possible to accidentally configure the Proxy-Authorization
header even though it won't have any effect as the request is not using
a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't
treat the Proxy-Authorization HTTP header as one carrying authentication
material and thus doesn't strip the header on cross-origin redirects.
Because this is a highly unlikely scenario, we believe the severity of
this vulnerability is low for almost all users. Out of an abundance of
caution urllib3 will automatically strip the Proxy-Authorization header
during cross-origin redirects to avoid the small chance that users are
doing this on accident.
Users should use urllib3's proxy support or disable automatic redirects
to achieve safe processing of the Proxy-Authorization header, but we
still decided to strip the header by default in order to further protect
users who aren't using the correct approach.

Affected Software/OS:
'python-urllib3' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2024-37891
https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e
https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.