Skip to content

Commit

Permalink
Merge pull request #5099 from github/G-Rath-GHSA-34jh-p97f-mpxf
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] authored Dec 18, 2024
2 parents 65a5e18 + 806f5cf commit 64ae082
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"schema_version": "1.4.0",
"id": "GHSA-34jh-p97f-mpxf",
"modified": "2024-06-17T21:37:20Z",
"modified": "2024-06-17T21:37:23Z",
"published": "2024-06-17T21:37:20Z",
"aliases": [
"CVE-2024-37891"
],
"summary": "urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects ",
"summary": "urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects",
"details": "When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected.\n\nHowever, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects.\n\nBecause this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident.\n\nUsers should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach.\n\n## Affected usages\n\nWe believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited:\n\n* Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support.\n* Not disabling HTTP redirects.\n* Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin.\n\n## Remediation\n\n* Using the `Proxy-Authorization` header with urllib3's `ProxyManager`.\n* Disabling HTTP redirects using `redirects=False` when sending requests.\n* Not using the `Proxy-Authorization` header.",
"severity": [
{
Expand Down

0 comments on commit 64ae082

Please sign in to comment.