Vulnerability Description
Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 7.0 |
| Python | Requests | <= 2.2.1 |
| Canonical | Ubuntu Linux | 14.04 |
| Mageia | Mageia | 4.0 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0409.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3146Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:133Broken Link
- http://www.ubuntu.com/usn/USN-2382-1Third Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108Issue Tracking
- https://github.com/kennethreitz/requests/issues/1885Issue TrackingPatch
- http://advisories.mageia.org/MGASA-2014-0409.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3146Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:133Broken Link
- http://www.ubuntu.com/usn/USN-2382-1Third Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108Issue Tracking
- https://github.com/kennethreitz/requests/issues/1885Issue TrackingPatch
FAQ
What is CVE-2014-1829?
CVE-2014-1829 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
How severe is CVE-2014-1829?
CVE-2014-1829 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1829?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Python Requests, Canonical Ubuntu Linux, Mageia Mageia.