certifi@2017.1.23 vulnerabilities

Python package for providing Mozilla's CA Bundle.

Direct Vulnerabilities

Known vulnerabilities in the certifi package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Improper Following of a Certificate's Chain of Trust

Affected versions of this package are vulnerable to Improper Following of a Certificate's Chain of Trust. E-Tugra's root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems. Conclusions of Mozilla's investigation can be found here.

Note:

This issue is not an inherent vulnerability in the package, but a security measure against potential harmful effects of trusting the now-revoked root certificates.

How to fix Improper Following of a Certificate's Chain of Trust?

Upgrade certifi to version 2023.7.22 or higher.

[2015.04.28,2023.7.22)
  • M
Insufficient Verification of Data Authenticity

Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity resulting in Certifi root certificate removal from TrustCor. The root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware.

How to fix Insufficient Verification of Data Authenticity?

Upgrade certifi to version 2022.12.7 or higher.

[,2022.12.7)
  • M
Improper Certificate Validation

certifi is a Python package for providing Mozilla's CA Bundle.

Affected versions of this package are vulnerable to Improper Certificate Validation due to not rejecting the deprecated 1024-bit certificates, and only giving a warning.

[,2017.04.17)