Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection
Description
Impact
Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext viaproxy_config.
Only the default SSLContext is impacted.
Patches
urllib3 >=1.26.4 has the issue resolved. urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies.
Workarounds
Upgrading is recommended as this is a minor release and not likely to break current usage.
Configuring anSSLContext withcheck_hostname=True and passing viaproxy_config instead of relying on the defaultSSLContext
For more information
If you have any questions or comments about this advisory:
- Email us atsethmichaellarson@gmail.com
References
- GHSA-5phf-pp7p-vc2r
- https://nvd.nist.gov/vuln/detail/CVE-2021-28363
- urllib3/urllib3@8d65ea1
- https://github.com/urllib3/urllib3/releases/tag/1.26.4
- https://github.com/urllib3/urllib3/commits/main
- https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15
- https://security.gentoo.org/glsa/202107-36
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml
- https://security.gentoo.org/glsa/202305-02
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL
- https://pypi.org/project/urllib3/1.26.4
- https://security.netapp.com/advisory/ntap-20240621-0007
- https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2021-59.yaml
Published by theNational Vulnerability DatabaseMar 15, 2021
ReviewedMar 19, 2021
Published to the GitHub Advisory DatabaseMar 19, 2021
Last updatedNov 18, 2024
Severity
Moderate / 10
CVSS v4 base metrics
Exploitability Metrics
Attack VectorNetwork
Attack ComplexityLow
Attack RequirementsNone
Privileges RequiredNone
User interactionNone
Vulnerable System Impact Metrics
ConfidentialityLow
IntegrityLow
AvailabilityNone
Subsequent System Impact Metrics
ConfidentialityNone
IntegrityNone
AvailabilityNone
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS score
(29th percentile)
Weaknesses
WeaknessCWE-295
Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.Learn more on MITRE.CVE ID
CVE-2021-28363
GHSA ID
GHSA-5phf-pp7p-vc2r
Source code
Credits
jalopezsilvaAnalyst
pquentinAnalyst
LoadingChecking history
Uh oh!
There was an error while loading.Please reload this page.
See something to contribute?Suggest improvements for this vulnerability.