Amazon Linux 2 Security Advisory: ALAS-2020-1413
Advisory Release Date: 2020-04-20 20:48 Pacific
Advisory Updated Date: 2020-04-23 23:23 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. (CVE-2018-20060)
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. (CVE-2019-11236)
A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected (302) from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user's valid credentials. (CVE-2018-18074)
Affected Packages:
python-virtualenv
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update python-virtualenv to update your system.
noarch:
python-virtualenv-15.1.0-4.amzn2.noarch
src:
python-virtualenv-15.1.0-4.amzn2.src