In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade RHEL:8 python27:2.7/python2-backports-ssl_match_hostname to version 0:3.5.0.1-11.module+el8.1.0+3111+de3f2d8e or higher.
This issue was patched in RHSA-2019:3335.
Note: Versions mentioned in the description apply only to the upstream python27:2.7/python2-backports-ssl_match_hostname package and not the python27:2.7/python2-backports-ssl_match_hostname package as distributed by RHEL.
See How to fix? for RHEL:8 relevant fixed versions and status.
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.