Vulnerability Details : CVE-2018-18074
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
Products affected by CVE-2018-18074
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:python:requests:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18074
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-18074
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18074
-
https://github.com/requests/requests/issues/4716
Should Authorization header be cleared in https -> http redirect? · Issue #4716 · psf/requests · GitHubExploit;Patch;Third Party Advisory
-
http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
Community Updates — Requests 2.22.0 documentationRelease Notes;Third Party Advisory
-
https://github.com/requests/requests/pull/4718
Strip Authorization header whenever root URL changes by bmerry · Pull Request #4718 · psf/requests · GitHubPatch;Third Party Advisory
-
https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
Merge pull request #4718 from bmerry/fix-4716 · psf/requests@c45d7c4 · GitHubPatch;Third Party Advisory
-
https://usn.ubuntu.com/3790-1/
USN-3790-1: Requests vulnerability | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
[security-announce] openSUSE-SU-2019:1754-1: moderate: Security update fMailing List;Third Party Advisory
-
https://bugs.debian.org/910766
#910766 - requests: CVE-2018-18074 - Debian Bug report logsExploit;Issue Tracking;Patch;Third Party Advisory
-
https://usn.ubuntu.com/3790-2/
USN-3790-2: Requests vulnerability | Ubuntu security noticesThird Party Advisory
-
https://www.oracle.com/security-alerts/cpujul2022.html
Oracle Critical Patch Update Advisory - July 2022
-
https://access.redhat.com/errata/RHSA-2019:2035
RHSA-2019:2035 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to