CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://bugs.python.org/issue35121 Exploit Issue Tracking Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://python-security.readthedocs.io/vuln/cookie-domain-check.html Vendor Advisory
https://security.gentoo.org/glsa/202003-26
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://bugs.python.org/issue35121 Exploit Issue Tracking Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://python-security.readthedocs.io/vuln/cookie-domain-check.html Vendor Advisory
https://security.gentoo.org/glsa/202003-26
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:02

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html - () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html - () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html -
References () https://access.redhat.com/errata/RHSA-2019:3725 - () https://access.redhat.com/errata/RHSA-2019:3725 -
References () https://access.redhat.com/errata/RHSA-2019:3948 - () https://access.redhat.com/errata/RHSA-2019:3948 -
References () https://bugs.python.org/issue35121 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.python.org/issue35121 - Exploit, Issue Tracking, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html - () https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html -
References () https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html - () https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html -
References () https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html - () https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html -
References () https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html - () https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ -
References () https://python-security.readthedocs.io/vuln/cookie-domain-check.html - Vendor Advisory () https://python-security.readthedocs.io/vuln/cookie-domain-check.html - Vendor Advisory
References () https://security.gentoo.org/glsa/202003-26 - () https://security.gentoo.org/glsa/202003-26 -
References () https://usn.ubuntu.com/4127-1/ - () https://usn.ubuntu.com/4127-1/ -
References () https://usn.ubuntu.com/4127-2/ - () https://usn.ubuntu.com/4127-2/ -
References () https://www.oracle.com/security-alerts/cpuapr2020.html - () https://www.oracle.com/security-alerts/cpuapr2020.html -

07 Nov 2023, 02:56

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/', 'name': 'FEDORA-2019-758824a3ff', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/', 'name': 'FEDORA-2019-0d3fcae639', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/', 'name': 'FEDORA-2019-74ba24605e', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ -

Information

Published : 2019-07-13 21:15

Updated : 2024-11-21 04:02


NVD link : CVE-2018-20852

Mitre link : CVE-2018-20852

CVE.ORG link : CVE-2018-20852


JSON object : View

Products Affected

python

  • python
CWE
CWE-20

Improper Input Validation