[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3456-1] requests security update



-------------------------------------------------------------------------
Debian LTS Advisory DLA-3456-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
June 18, 2023                                 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : requests
Version        : 2.21.0-1+deb10u1
CVE ID         : CVE-2023-32681
Debian Bug     : 1036693

Requests, a Python HTTP library, has been leaking Proxy-Authorization headers
to destination servers when redirected to an HTTPS endpoint. For HTTP
connections sent through the tunnel, the proxy will identify the header in the
request itself and remove it prior to forwarding to the destination server.
However when sent over HTTPS, the `Proxy-Authorization` header must be sent in
the CONNECT request as the proxy has no visibility into the tunneled request.
This results in Requests forwarding proxy credentials to the destination
server unintentionally, allowing a malicious actor to potentially exfiltrate
sensitive information.

For Debian 10 buster, this problem has been fixed in version
2.21.0-1+deb10u1.

We recommend that you upgrade your requests packages.

For the detailed security status of requests please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/requests

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: