A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Core | python | 2019-08-07 23:46 | ALAS2-2019-1258 |
Amazon Linux 1 | python27 | 2019-08-07 23:02 | ALAS-2019-1258 |
Amazon Linux 2 - Core | python3 | 2019-08-07 23:48 | ALAS2-2019-1259 |
Amazon Linux 1 | python34 | 2019-08-07 23:03 | ALAS-2019-1259 |
Amazon Linux 1 | python34 | 2019-11-19 17:31 | ALAS-2019-1324 |
Amazon Linux 1 | python35 | 2019-08-07 23:03 | ALAS-2019-1259 |
Amazon Linux 1 | python36 | 2019-08-07 23:03 | ALAS-2019-1259 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 9.8 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv3 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 5.0 | AV:N/AC:L/Au:N/C:P/I:N/A:N |