Updated: 2024-11-30 02:54:46.733843
Description:
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | MEDIUM | 5 |
CVSS Version 3.x | MEDIUM | 5.3 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
CentOS 6 ELS | python | 2.6.6 | 5.3 | MEDIUM | Released | CLSA-2021:1633442879 | 2022-05-05 12:01:57 | |
CloudLinux 6 ELS | python | 2.6.6 | 5.3 | MEDIUM | Released | 2021-11-02 14:03:18 | ||
Oracle Linux 6 ELS | python | 2.6.6 | 5.3 | MEDIUM | Not Vulnerable | CLSA-2021:1634925483 | 2021-11-02 14:03:18 | |
Ubuntu 16.04 ELS | python2.7 | 2.7.12 | 5.3 | MEDIUM | Already Fixed | 2024-07-18 14:54:05 | ||
Ubuntu 18.04 ELS | python2.7 | 2.7.17-1 | 5.3 | MEDIUM | Not Vulnerable | 2024-07-18 14:23:17 |