6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
6.7 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.8%
Issue Overview:
A flaw was found in the Python-requests package, where it is vulnerable to potentially leaking Proxy-Authorization headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how rebuild_proxies is used to recompute and reattach the Proxy-Authorization header to requests when redirected. This behavior only affects proxied requests when credentials are supplied in the URL user information component (for example, https://username:password@proxy:8080). (CVE-2023-32681)
Affected Packages:
python3-requests
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update python3-requests to update your system.
New Packages:
noarch:
python3-requests-2.14.2-2.amzn2.0.3.noarch
src:
python3-requests-2.14.2-2.amzn2.0.3.src
Red Hat: CVE-2023-32681
Mitre: CVE-2023-32681
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | noarch | python3-requests | < 2.14.2-2.amzn2.0.3 | python3-requests-2.14.2-2.amzn2.0.3.noarch.rpm |
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
6.7 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.8%