CVE编号
CVE-2018-18074利用情况
暂无补丁情况
官方补丁披露时间
2018-10-10漏洞描述
在2018-09-14之前通过2.19.1的Requests程序包在收到相同主机名https-to-http重定向后,会向HTTP URI发送HTTP Authorization标头,这使远程攻击者更容易通过嗅探来发现凭据网络。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
参考链接 |
|
---|---|
http://docs.python-requests.org/en/master/community/updates/#release-and-vers... | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html | |
https://access.redhat.com/errata/RHSA-2019:2035 | |
https://bugs.debian.org/910766 | |
https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff | |
https://github.com/requests/requests/issues/4716 | |
https://github.com/requests/requests/pull/4718 | |
https://usn.ubuntu.com/3790-1/ | |
https://usn.ubuntu.com/3790-2/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | python-requests | requests | * |
Up to (excluding) 2.20.0 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | requests | * |
Up to (excluding) 2.6.0-5.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | requests | * |
Up to (excluding) 2.6.0-7.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | requests | * |
Up to (excluding) 15.1.0-4.el7_7 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | requests | * |
Up to (excluding) 9.0.3-16.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | requests | * |
Up to (excluding) 2.12.4-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | requests | * |
Up to (excluding) 2.20.0-1.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | requests | * |
Up to (excluding) 2.20.0-1.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | requests | * |
Up to (excluding) 2.20.0-1.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | requests | * |
Up to (excluding) 2.14.2-2.el6_10 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | requests | * |
Up to (excluding) 8.1.2-12.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | requests | * |
Up to (excluding) 2.20.1-lp151.2.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | requests | * |
Up to (excluding) 9.0.3-7.el7_7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | requests | * |
Up to (excluding) 9.0.3-16.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | requests | * |
Up to (excluding) 9.0.3-16.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | requests | * |
Up to (excluding) 0.24.0-2.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | requests | * |
Up to (excluding) 0.24.0-2.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | requests | * |
Up to (excluding) 2.2.1-1ubuntu0.4 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | requests | * |
Up to (excluding) 2.9.1-3ubuntu0.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | requests | * |
Up to (excluding) 9.0.1-2.3~ubuntu1.18.04.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | requests | * |
Up to (excluding) 2.18.4-2ubuntu0.18.10.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.04 | requests | * |
Up to (excluding) 2.18.4-2ubuntu0.18.10.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...