CVE-2021-28363 (Medium) detected in urllib3-1.26.2-py2.py3-none-any.whl
Opened this issue · 0 comments
CVE-2021-28363 - Medium Severity Vulnerability
Vulnerable Library - urllib3-1.26.2-py2.py3-none-any.whl
HTTP library with thread-safe connection pooling, file post, and more.
Library home page: https://files.pythonhosted.org/packages/f5/71/45d36a8df68f3ebb098d6861b2c017f3d094538c0fb98fa61d4dc43e69b9/urllib3-1.26.2-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- selenium-3.141.0-py2.py3-none-any.whl (Root Library)
- ❌ urllib3-1.26.2-py2.py3-none-any.whl (Vulnerable Library)
Found in base branch: master
Vulnerability Details
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.
Publish Date: 2021-03-15
URL: CVE-2021-28363
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-5phf-pp7p-vc2r
Release Date: 2021-03-15
Fix Resolution (urllib3): 1.26.4
Direct dependency fix Resolution (selenium): 4.0.0
Step up your Open Source Security Game with Mend here