9.8

CVE-2019-10160

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PythonPython Version >= 2.7.0 < 2.7.17
PythonPython Version >= 3.5.0 < 3.5.8
PythonPython Version >= 3.6.0 < 3.6.9
PythonPython Version >= 3.7.0 < 3.7.4
PythonPython Version3.8.0 Updatealpha4
PythonPython Version3.8.0 Updatebeta1
RedhatEnterprise Linux Eus Version7.6
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
OpensuseLeap Version15.0
OpensuseLeap Version15.1
FedoraprojectFedora Version29
FedoraprojectFedora Version30
FedoraprojectFedora Version31
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
RedhatVirtualization Version4.0
   RedhatEnterprise Linux Version7.0
NetappCloud Backup Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.14% 0.836
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
secalert@redhat.com 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-172 Encoding Error

The product does not properly encode or decode the data, resulting in unexpected values.

CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

https://usn.ubuntu.com/4127-1/
Third Party Advisory
https://usn.ubuntu.com/4127-2/
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
Patch
Third Party Advisory
Issue Tracking