ghc-automation-staging-parallel-4-p1 / 8603278_44

0 stars 0 forks source link

CVE-2019-9740 (Medium) detected in urllib3-1.17-py2.py3-none-any.whl #10

Open staging-whitesource-for-github-com[bot] opened 4 hours ago

staging-whitesource-for-github-com[bot] commented 4 hours ago

CVE-2019-9740 - Medium Severity Vulnerability

Vulnerable Library - urllib3-1.17-py2.py3-none-any.whl

HTTP library with thread-safe connection pooling, file post, and more.

Library home page: https://files.pythonhosted.org/packages/40/4e/54411cb5f7c69782304a7ab27ba9d7d9a3908cd68b67f6502137342d0d9c/urllib3-1.17-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /tmp/ws-ua_20241027232607_XHVFQR/python_OAMJUI/202410272326071/env/lib/python3.8/site-packages/urllib3-1.17.dist-info

Dependency Hierarchy: - :x: **urllib3-1.17-py2.py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: 83e83af6a33e47edb742829dec5a126039d06dbe

Found in base branch: main

Vulnerability Details

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

Publish Date: 2019-03-13

URL: CVE-2019-9740

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740

Release Date: 2019-03-13

Fix Resolution: 1.24.3


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.