Bug 2242493 (CVE-2023-43804)

Summary: CVE-2023-43804 python-urllib3: Cookie request header isn't stripped during cross-origin redirects
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adudiak, apevec, bbuckingham, bcourt, bdettelb, cstratak, dfreiber, eglynn, ehelms, epacific, gsuckevi, hhorak, jburrell, jcammara, jhardy, jjoyce, jkoehler, jneedle, jobarker, jorton, jschluet, jsherril, kshier, lhh, lzap, mabashia, mburns, mgarciac, mhulan, nmoumoul, orabin, pcreech, pgrist, python-maint, rchan, rhos-maint, rogbas, simaishi, slinaber, smcdonal, stcannon, teagle, tfister, torsava, tvignaud, vkumar, yguenane, zsadeh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: urllib3 2.0.6, urllib3 1.26.17 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2242496, 2242497, 2242498, 2242499, 2242500, 2242501, 2244268, 2250794, 2250795, 2250796    
Bug Blocks: 2242490    

Description Patrick Del Bello 2023-10-06 14:32:41 UTC
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.

https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb

Comment 4 errata-xmlrpc 2023-10-30 01:19:32 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2023:6158 https://access.redhat.com/errata/RHSA-2023:6158

Comment 5 errata-xmlrpc 2023-11-08 11:00:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:6812 https://access.redhat.com/errata/RHSA-2023:6812

Comment 8 Sandipan Roy 2023-11-21 07:08:24 UTC
Created python-urllib3 tracking bugs for this issue:

Affects: epel-all [bug 2250794]
Affects: fedora-all [bug 2250795]
Affects: openstack-rdo [bug 2250796]

Comment 9 errata-xmlrpc 2023-11-21 11:18:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2023:7378 https://access.redhat.com/errata/RHSA-2023:7378

Comment 10 errata-xmlrpc 2023-11-21 11:24:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:7385 https://access.redhat.com/errata/RHSA-2023:7385

Comment 11 errata-xmlrpc 2023-11-21 11:32:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:7407 https://access.redhat.com/errata/RHSA-2023:7407

Comment 12 errata-xmlrpc 2023-11-21 15:30:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:7435 https://access.redhat.com/errata/RHSA-2023:7435

Comment 13 errata-xmlrpc 2023-11-28 14:51:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:7523 https://access.redhat.com/errata/RHSA-2023:7523

Comment 14 errata-xmlrpc 2023-11-28 15:35:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2023:7528 https://access.redhat.com/errata/RHSA-2023:7528

Comment 15 errata-xmlrpc 2023-12-12 17:22:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:7753 https://access.redhat.com/errata/RHSA-2023:7753

Comment 16 errata-xmlrpc 2024-01-10 10:43:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0116 https://access.redhat.com/errata/RHSA-2024:0116

Comment 17 errata-xmlrpc 2024-01-10 11:30:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0133 https://access.redhat.com/errata/RHSA-2024:0133

Comment 19 errata-xmlrpc 2024-01-16 14:36:00 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 17.1

Via RHSA-2024:0187 https://access.redhat.com/errata/RHSA-2024:0187

Comment 22 errata-xmlrpc 2024-01-18 16:25:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0300 https://access.redhat.com/errata/RHSA-2024:0300

Comment 23 errata-xmlrpc 2024-01-24 16:30:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0464 https://access.redhat.com/errata/RHSA-2024:0464

Comment 24 errata-xmlrpc 2024-01-30 13:25:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0588 https://access.redhat.com/errata/RHSA-2024:0588

Comment 26 errata-xmlrpc 2024-02-07 20:42:40 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2024:0733 https://access.redhat.com/errata/RHSA-2024:0733

Comment 28 errata-xmlrpc 2024-04-30 09:41:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2159 https://access.redhat.com/errata/RHSA-2024:2159

Comment 29 errata-xmlrpc 2024-05-22 09:26:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:2986 https://access.redhat.com/errata/RHSA-2024:2986

Comment 30 errata-xmlrpc 2024-05-22 09:26:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:2985 https://access.redhat.com/errata/RHSA-2024:2985

Comment 31 errata-xmlrpc 2024-05-22 09:26:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:2987 https://access.redhat.com/errata/RHSA-2024:2987