Vulnerability Details : CVE-2023-43804
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
Products affected by CVE-2023-43804
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
- cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-43804
0.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-43804
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N |
0.7
|
5.2
|
GitHub, Inc. |
CWE ids for CVE-2023-43804
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2023-43804
-
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
Cookie request header isn't stripped during cross-origin redirects · Advisory · urllib3/urllib3 · GitHubPatch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/
[SECURITY] Fedora 39 Update: python-urllib3-1.26.18-1.fc39 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/
[SECURITY] Fedora 37 Update: python-urllib3-1.26.17-1.fc37 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
Backport GHSA-v845-jxx5-vc9f (#3139) · urllib3/urllib3@0122035 · GitHubPatch
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/
[SECURITY] Fedora 38 Update: python-urllib3-1.26.17-1.fc38 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
[SECURITY] [DLA 3610-1] python-urllib3 security updateMailing List;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20241213-0007/
CVE-2023-43804 urllib3 Vulnerability in NetApp Products | NetApp Product Security
-
https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
CVE-2023-43804 (Urllib3 Vulnerability) - vsociety
-
https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
Merge pull request from GHSA-v845-jxx5-vc9f · urllib3/urllib3@644124e · GitHubPatch
Jump to