CVE-2023-43804

urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
References
Link Resource
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb Patch
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d Patch
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ Mailing List Third Party Advisory
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb Patch
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d Patch
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ Mailing List Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 5.9
References
  • () https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3 -
References () https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb - Patch () https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb - Patch
References () https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d - Patch () https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d - Patch
References () https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f - Patch, Vendor Advisory () https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ - Mailing List, Third Party Advisory

01 Feb 2024, 00:55

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ - Mailing List, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ - Mailing List, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ - Mailing List, Third Party Advisory
First Time Fedoraproject fedora
Fedoraproject

03 Nov 2023, 22:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ -

13 Oct 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ -

11 Oct 2023, 03:15

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-200
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ -

10 Oct 2023, 13:44

Type Values Removed Values Added
First Time Python
Debian
Python urllib3
Debian debian Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
CWE CWE-200 NVD-CWE-noinfo
References (MISC) https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb - (MISC) https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb - Patch
References (MISC) https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f - (MISC) https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f - Patch, Vendor Advisory
References (MISC) https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d - (MISC) https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d - Patch
References (MISC) https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html - Mailing List, Third Party Advisory

08 Oct 2023, 14:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html -

04 Oct 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-04 17:15

Updated : 2024-11-21 08:24


NVD link : CVE-2023-43804

Mitre link : CVE-2023-43804

CVE.ORG link : CVE-2023-43804


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

python

  • urllib3
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo