Bug 1144907 (CVE-2014-1830) - CVE-2014-1830 python-requests: Proxy-Authorization header leak
Summary: CVE-2014-1830 python-requests: Proxy-Authorization header leak
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2014-1830
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1046627 1046628 1144910
Blocks: 1046630
TreeView+ depends on / blocked
 
Reported: 2014-09-22 01:02 UTC by Arun Babu Neelicattu
Modified: 2021-02-17 06:11 UTC (History)
34 users (show)

Fixed In Version: requests 2.3.0
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-01-20 18:19:45 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1046626 0 low CLOSED CVE-2014-1829 python-requests: redirect can expose netrc password 2021-02-22 00:41:40 UTC

Internal Links: 1046626

Description Arun Babu Neelicattu 2014-09-22 01:02:00 UTC
It was discovered that the python-requests Proxy-Authorization header was never re-evaluated when a redirect occurs. The Proxy-Authorization header was sent to any new proxy or non-proxy destination as redirected.

References:

https://github.com/kennethreitz/requests/issues/1885#issuecomment-33793651

Comment 3 Arun Babu Neelicattu 2014-09-22 01:10:00 UTC
Victims Record:

https://github.com/victims/victims-cve-db/blob/master/database/python/2014/1830.yaml

Comment 4 Arun Babu Neelicattu 2014-09-22 01:15:41 UTC
Created python-requests tracking bugs for this issue:

Affects: fedora-all [bug 1046627]
Affects: epel-7 [bug 1144910]
Affects: epel-6 [bug 1046628]

Comment 6 Vincent Danen 2015-01-20 18:19:45 UTC
Statement:

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.


Note You need to log in before you can comment on or make changes to this bug.