CVE-2023-43804

urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
References
Link Resource
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb Patch
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d Patch
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ Mailing List Third Party Advisory
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb Patch
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d Patch
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20241213-0007/
https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

13 Dec 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241213-0007/ -

21 Nov 2024, 08:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 5.9
References
  • () https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3 -
References () https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb - Patch () https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb - Patch
References () https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d - Patch () https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d - Patch
References () https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f - Patch, Vendor Advisory () https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/ - Mailing List, Third Party Advisory

01 Feb 2024, 00:55

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-04 17:15

Updated : 2024-12-13 14:15


NVD link : CVE-2023-43804

Mitre link : CVE-2023-43804

CVE.ORG link : CVE-2023-43804


JSON object : View

Products Affected

fedoraproject

  • fedora

python

  • urllib3

debian

  • debian_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo