View all vulnerabilities

CVE-2023-43804

`Cookie` HTTP header isn't stripped on cross-origin redirects

urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.Users **must** handle redirects themselves instead of relying on urllib3's automatic redirects to achieve safe processing of the `Cookie` header, thus we decided to strip the header by default in order to further protect users who aren't using the correct approach.## Affected usagesWe believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited:* Using an affected version of urllib3 (patched in v1.26.17 and v2.0.6)* Using the `Cookie` header on requests, which is mostly typical for impersonating a browser.* Not disabling HTTP redirects* Either not using HTTPS or for the origin server to redirect to a malicious origin.## Remediation* Upgrading to at least urllib3 v1.26.17 or v2.0.6* Disabling HTTP redirects using `redirects=False` when sending requests.* Not using the `Cookie` header.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
5.9
Score Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
Affected Versions
urllib3 >= 2.0.0 < 2.0.6; urllib3 < 1.26.17
Severity
Medium
Ecosystem
Python
Publish Date
October 2, 2023
Modified Date
December 13, 2024