Improper Input Validation Affecting python package, versions [2.0,2.7.17)[3.0.0,3.4.10)[3.5.0,3.5.7)[3.6.0,3.6.9)[3.7.0,3.7.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.46% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-PYTHON-2317675
  • published14 Dec 2021
  • disclosed13 Jul 2019
  • creditUnknown

Introduced: 13 Jul 2019

CVE-2018-20852  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade python to version 2.7.17, 3.4.10, 3.5.7, 3.6.9, 3.7.3 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS Scores

version 3.1