Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/python-urllib3@1.26.5-1~exp1
purl pkg:deb/debian/python-urllib3@1.26.5-1~exp1
Next non-vulnerable version 1.26.12-1+deb12u3
Latest non-vulnerable version 2.6.3-2
Risk 4.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-4evk-srqq-fuef
Aliases:
CVE-2023-45803
GHSA-g4mx-q9vg-27p4
PYSEC-2023-212
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
1.26.12-1+deb12u1
Affected by 1 other vulnerability.
VCID-5tkp-pxz9-h7c2
Aliases:
CVE-2024-37891
GHSA-34jh-p97f-mpxf
urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. ## Affected usages We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: * Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. * Not disabling HTTP redirects. * Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. ## Remediation * Using the `Proxy-Authorization` header with urllib3's `ProxyManager`. * Disabling HTTP redirects using `redirects=False` when sending requests. * Not using the `Proxy-Authorization` header.
1.26.12-1+deb12u1
Affected by 1 other vulnerability.
VCID-7wcj-zvjq-xud3
Aliases:
CVE-2025-50181
GHSA-pq67-6m6q-mj2v
urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation urllib3 handles redirects and retries using the same mechanism, which is controlled by the `Retry` object. The most common way to disable redirects is at the request level, as follows: ```python resp = urllib3.request("GET", "https://httpbin.org/redirect/1", redirect=False) print(resp.status) # 302 ``` However, it is also possible to disable redirects, for all requests, by instantiating a `PoolManager` and specifying `retries` in a way that disable redirects: ```python import urllib3 http = urllib3.PoolManager(retries=0) # should raise MaxRetryError on redirect http = urllib3.PoolManager(retries=urllib3.Retry(redirect=0)) # equivalent to the above http = urllib3.PoolManager(retries=False) # should return the first response resp = http.request("GET", "https://httpbin.org/redirect/1") ``` However, the `retries` parameter is currently ignored, which means all the above examples don't disable redirects. ## Affected usages Passing `retries` on `PoolManager` instantiation to disable redirects or restrict their number. By default, requests and botocore users are not affected. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. ## Remediation You can remediate this vulnerability with the following steps: * Upgrade to a patched version of urllib3. If your organization would benefit from the continued support of urllib3 1.x, please contact [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com) to discuss sponsorship or contribution opportunities. * Disable redirects at the `request()` level instead of the `PoolManager()` level.
1.26.12-1+deb12u1
Affected by 1 other vulnerability.
VCID-969r-9mvk-uyh4
Aliases:
CVE-2023-43804
GHSA-v845-jxx5-vc9f
PYSEC-2023-192
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
1.26.12-1+deb12u1
Affected by 1 other vulnerability.
VCID-kjka-a931-uygj
Aliases:
CVE-2026-21441
GHSA-38jv-5279-wg99
Decompression-bomb safeguards bypassed when following HTTP redirects (streaming API) ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.6.2/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. However, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client (high CPU usage and large memory allocations for decompressed data; CWE-409). ### Affected usages Applications and libraries using urllib3 version 2.6.2 and earlier to stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. ### Remediation Upgrade to at least urllib3 v2.6.3 in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable [redirects](https://urllib3.readthedocs.io/en/2.6.2/user-guide.html#retrying-requests) by setting `redirect=False` for requests to untrusted source.
1.26.12-1+deb12u1
Affected by 1 other vulnerability.
VCID-v365-pn8r-e7dh
Aliases:
CVE-2025-66418
GHSA-gm62-xv2j-4w53
urllib3 allows an unbounded number of links in the decompression chain urllib3 supports chained HTTP encoding algorithms for response content according to RFC 9110 (e.g., `Content-Encoding: gzip, zstd`). However, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data.
1.26.12-1+deb12u1
Affected by 1 other vulnerability.
VCID-zevs-1ge5-y7g7
Aliases:
CVE-2025-66471
GHSA-2xpw-w6gg-jr37
urllib3 streaming API improperly handles highly compressed data urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.
1.26.12-1+deb12u3
Affected by 0 other vulnerabilities.
2.6.3-2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-61sh-s5y1-w3f8 The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2). CVE-2020-7212
GHSA-hmv2-79q8-fv6g
PYSEC-2020-149
VCID-6kxp-qa5x-q3bq The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument. CVE-2019-11324
GHSA-mh33-7rrq-662w
PYSEC-2019-133
VCID-8par-whwz-6kft An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. CVE-2021-33503
GHSA-q2q7-5pp4-w6pg
PYSEC-2021-108
VCID-b3e6-k53t-bkgk In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. CVE-2019-11236
GHSA-r64q-w8jr-g9qp
PYSEC-2019-132
VCID-gxkt-bvtg-gbaj urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116. CVE-2020-26137
GHSA-wqvq-5m8c-6g24
PYSEC-2020-148
VCID-pu6r-vafw-gfe4 The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted. CVE-2021-28363
GHSA-5phf-pp7p-vc2r
PYSEC-2021-59
VCID-squd-j9t3-9khh urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive). CVE-2018-25091
GHSA-gwvm-45gx-3cf8
PYSEC-2023-207

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T09:25:56.349410+00:00 Debian Importer Affected by VCID-zevs-1ge5-y7g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T01:06:02.552427+00:00 Debian Oval Importer Fixing VCID-b3e6-k53t-bkgk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:55:58.875795+00:00 Debian Oval Importer Affected by VCID-969r-9mvk-uyh4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:10:34.648749+00:00 Debian Oval Importer Fixing VCID-6kxp-qa5x-q3bq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:41:59.652384+00:00 Debian Oval Importer Fixing VCID-gxkt-bvtg-gbaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:30:25.451215+00:00 Debian Oval Importer Fixing VCID-8par-whwz-6kft https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:52:45.194498+00:00 Debian Oval Importer Affected by VCID-4evk-srqq-fuef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:34:03.048401+00:00 Debian Oval Importer Fixing VCID-pu6r-vafw-gfe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:26:27.465894+00:00 Debian Oval Importer Affected by VCID-v365-pn8r-e7dh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:54:58.490102+00:00 Debian Oval Importer Affected by VCID-5tkp-pxz9-h7c2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:18:07.851024+00:00 Debian Oval Importer Fixing VCID-61sh-s5y1-w3f8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:14:21.294586+00:00 Debian Oval Importer Affected by VCID-kjka-a931-uygj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:54:44.555964+00:00 Debian Oval Importer Affected by VCID-7wcj-zvjq-xud3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:32:14.654895+00:00 Debian Oval Importer Fixing VCID-squd-j9t3-9khh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-12T00:38:02.220913+00:00 Debian Oval Importer Fixing VCID-b3e6-k53t-bkgk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:28:18.615598+00:00 Debian Oval Importer Affected by VCID-969r-9mvk-uyh4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:44:30.059902+00:00 Debian Oval Importer Fixing VCID-6kxp-qa5x-q3bq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:16:45.645240+00:00 Debian Oval Importer Fixing VCID-gxkt-bvtg-gbaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:05:42.371435+00:00 Debian Oval Importer Fixing VCID-8par-whwz-6kft https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:29:16.744978+00:00 Debian Oval Importer Affected by VCID-4evk-srqq-fuef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:10:57.880259+00:00 Debian Oval Importer Fixing VCID-pu6r-vafw-gfe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:05:45.189501+00:00 Debian Oval Importer Affected by VCID-v365-pn8r-e7dh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:35:27.476273+00:00 Debian Oval Importer Affected by VCID-5tkp-pxz9-h7c2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:59:52.567283+00:00 Debian Oval Importer Fixing VCID-61sh-s5y1-w3f8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:56:09.948030+00:00 Debian Oval Importer Affected by VCID-kjka-a931-uygj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:36:50.528403+00:00 Debian Oval Importer Affected by VCID-7wcj-zvjq-xud3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:15:02.424788+00:00 Debian Oval Importer Fixing VCID-squd-j9t3-9khh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:17:41.776700+00:00 Debian Importer Affected by VCID-zevs-1ge5-y7g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-09T00:07:59.992183+00:00 Debian Oval Importer Fixing VCID-b3e6-k53t-bkgk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:58:43.149249+00:00 Debian Oval Importer Affected by VCID-969r-9mvk-uyh4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:16:50.372858+00:00 Debian Oval Importer Fixing VCID-6kxp-qa5x-q3bq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:50:13.133713+00:00 Debian Oval Importer Fixing VCID-gxkt-bvtg-gbaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:39:27.001196+00:00 Debian Oval Importer Fixing VCID-8par-whwz-6kft https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:04:59.796286+00:00 Debian Oval Importer Affected by VCID-4evk-srqq-fuef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:47:27.779048+00:00 Debian Oval Importer Fixing VCID-pu6r-vafw-gfe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:44:52.478147+00:00 Debian Oval Importer Affected by VCID-v365-pn8r-e7dh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:15:33.015577+00:00 Debian Oval Importer Affected by VCID-5tkp-pxz9-h7c2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:41:40.928886+00:00 Debian Oval Importer Fixing VCID-61sh-s5y1-w3f8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:38:06.141541+00:00 Debian Oval Importer Affected by VCID-kjka-a931-uygj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:19:59.861518+00:00 Debian Oval Importer Affected by VCID-7wcj-zvjq-xud3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:58:59.716758+00:00 Debian Oval Importer Fixing VCID-squd-j9t3-9khh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-04T18:04:02.119395+00:00 Debian Importer Affected by VCID-zevs-1ge5-y7g7 https://security-tracker.debian.org/tracker/data/json 38.1.0