View all vulnerabilities

CVE-2024-35195

Requests `Session` object does not verify requests after making first request with verify=False

When making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same origin will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool.### RemediationAny of these options can be used to remediate the current issue, we highly recommend upgrading as the preferred mitigation.* Upgrade to `requests>=2.32.0`.* For `requests<2.32.0`, avoid setting `verify=False` for the first request to a host while using a Requests Session.* For `requests<2.32.0`, call `close()` on `Session` objects to clear existing connections if `verify=False` is used.### Related Links* https://github.com/psf/requests/pull/6655

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
5.5
Score Vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
Affected Versions
requests < 2.32.0
Severity
Medium
Ecosystem
Python
Publish Date
May 20, 2024
Modified Date
July 15, 2024