Vulnerability Description
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Python | Requests | < 2.20.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Opensuse | Leap | 15.1 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://docs.python-requests.org/en/master/community/updates/#release-and-versionRelease NotesThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.htmlMailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2035Third Party Advisory
- https://bugs.debian.org/910766ExploitIssue TrackingPatch
- https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938ePatchThird Party Advisory
- https://github.com/requests/requests/issues/4716ExploitPatchThird Party Advisory
- https://github.com/requests/requests/pull/4718PatchThird Party Advisory
- https://usn.ubuntu.com/3790-1/Third Party Advisory
- https://usn.ubuntu.com/3790-2/Third Party Advisory
- https://www.oracle.com/security-alerts/cpujul2022.html
- http://docs.python-requests.org/en/master/community/updates/#release-and-versionRelease NotesThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.htmlMailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2035Third Party Advisory
- https://bugs.debian.org/910766ExploitIssue TrackingPatch
- https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938ePatchThird Party Advisory
FAQ
What is CVE-2018-18074?
CVE-2018-18074 is a vulnerability with a CVSS score of 7.5 (HIGH). The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to dis...
How severe is CVE-2018-18074?
CVE-2018-18074 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18074?
Check the references section above for vendor advisories and patch information. Affected products include: Python Requests, Canonical Ubuntu Linux, Opensuse Leap, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.