Search for packages
Package details: pkg:pypi/urllib3@1.26.19
purl pkg:pypi/urllib3@1.26.19
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-1cgk-q3r3-aaam urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. ## Affected usages We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: * Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. * Not disabling HTTP redirects. * Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. ## Remediation * Using the `Proxy-Authorization` header with urllib3's `ProxyManager`. * Disabling HTTP redirects using `redirects=False` when sending requests. * Not using the `Proxy-Authorization` header. CVE-2024-37891
GHSA-34jh-p97f-mpxf

Date Actor Action Vulnerability Source VulnerableCode Version
2024-10-15T19:30:10.297076+00:00 GithubOSV Importer Fixing VCID-1cgk-q3r3-aaam https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-34jh-p97f-mpxf/GHSA-34jh-p97f-mpxf.json 34.0.2
2024-10-07T22:16:22.883357+00:00 GHSA Importer Fixing VCID-1cgk-q3r3-aaam https://github.com/advisories/GHSA-34jh-p97f-mpxf 34.0.2
2024-09-18T09:19:05.428228+00:00 GithubOSV Importer Fixing VCID-1cgk-q3r3-aaam https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-34jh-p97f-mpxf/GHSA-34jh-p97f-mpxf.json 34.0.1
2024-09-17T22:28:27.374021+00:00 GitLab Importer Fixing VCID-1cgk-q3r3-aaam https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/urllib3/CVE-2024-37891.yml 34.0.1
2024-09-17T22:12:39.542130+00:00 GHSA Importer Fixing VCID-1cgk-q3r3-aaam https://github.com/advisories/GHSA-34jh-p97f-mpxf 34.0.1
2024-07-17T19:18:10.736634+00:00 GitLab Importer Fixing VCID-1cgk-q3r3-aaam https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/urllib3/CVE-2024-37891.yml 34.0.0rc4
2024-06-18T01:04:18.653362+00:00 GHSA Importer Fixing VCID-1cgk-q3r3-aaam https://github.com/advisories/GHSA-34jh-p97f-mpxf 34.0.0rc4
2024-06-18T00:33:48.811393+00:00 GithubOSV Importer Fixing VCID-1cgk-q3r3-aaam https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-34jh-p97f-mpxf/GHSA-34jh-p97f-mpxf.json 34.0.0rc4