CVE-2019-11324
Published: 18 April 2019
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
Priority
Status
Package | Release | Status |
---|---|---|
python-urllib3 Launchpad, Ubuntu, Debian |
bionic |
Released
(1.22-1ubuntu0.18.04.1)
|
cosmic |
Released
(1.22-1ubuntu0.18.10.1)
|
|
disco |
Released
(1.24.1-1ubuntu0.1)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(1.24.2)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |