Date: Fri, 7 Sep 2012 07:50:26 -0400 (EDT) From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org>, Andrey Petrov <andrey.petrov@...zow.net>, Jamie Strandboge <jamie@...ntu.com> Subject: CVE Request -- urllib3: Does not check for SSL certificates by default Hello Kurt, Steve, vendors, it was reported that urllib3, a Python HTTP library with thread-safe connection pooling and file post support, did not perform SSL certificates verification by default. A rogue HTTP server could use this flaw to conduct man-in-the-middle (MITM) attacks. References:  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686872  https://bugs.launchpad.net/ubuntu/+source/python-urllib3/+bug/1047054  https://bugzilla.redhat.com/show_bug.cgi?id=855320 (the bug actually has python-requests in the summary, but only due the fact it contains embedded urllib3) Patch applied by the Ubuntu Linux distribution:  http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=python-urllib3_1.3-2ubuntu1.debdiff;att=1;bug=686872 Reproducer:  https://bugs.launchpad.net/ubuntu/+source/python-urllib3/+bug/1047054/comments/0 Could you allocate a CVE id for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.