Python

Urllib3

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 19.06.2025 01:15:24
  • Zuletzt bearbeitet 18.09.2025 13:51:10

urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore u...

  • EPSS 0.06%
  • Veröffentlicht 17.10.2023 20:15:10
  • Zuletzt bearbeitet 13.02.2025 18:15:32

urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a req...

  • EPSS 0.25%
  • Veröffentlicht 15.10.2023 19:15:09
  • Zuletzt bearbeitet 21.11.2024 04:03:32

urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintende...

  • EPSS 0.47%
  • Veröffentlicht 04.10.2023 17:15:10
  • Zuletzt bearbeitet 13.12.2024 14:15:20

urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to spe...

  • EPSS 0.86%
  • Veröffentlicht 29.06.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:58

An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed ...

  • EPSS 0.11%
  • Veröffentlicht 15.03.2021 18:15:19
  • Zuletzt bearbeitet 21.11.2024 05:59:35

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname...

  • EPSS 0.24%
  • Veröffentlicht 30.09.2020 18:15:26
  • Zuletzt bearbeitet 21.11.2024 05:19:19

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

  • EPSS 0.6%
  • Veröffentlicht 06.03.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:36:50

The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent en...

  • EPSS 1.42%
  • Veröffentlicht 18.04.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:53

The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure i...

Exploit
  • EPSS 0.59%
  • Veröffentlicht 15.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:47

In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.