Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 14 Mar 2015 11:50:48 -0500
From: Ian Cordasco <>
Cc: Cory Benfield <>, Matthew Daley <>,
Subject: CVE Request for python-requests session fixation vulnerability

Last night, Matthew Daley (CC'd on this email) privately disclosed to
the requests project a vulnerability in requests which has now been
fixed in requests v2.6.0
( by this commit:

The following is the relevant excerpts from the description provided by Matthew:

The issue occurs when Requests is handling a HTTP response that is a
redirection and that also sets cookies without an explicit domain
parameter. Instead of the cookies only being set for the domain which
sent the HTTP response, they are also sent to the redirection target,
regardless of its domain.

The issue could be exploited in the following ways:
* If you are the redirection source (ie. you can make Requests hit
your URL), you can make Requests perform a request to any third-party
domain with cookies of your choosing. This may be useful in performing
a session fixation attack.
* If you are the redirection target (ie. you can make a third-party
site redirect to your URL), you are able to steal any cookies set by
the third-party redirection.

The change that introduced this vulnerability was first included in
version 2.1.0 of requests. As such every version since that version up
to and including 2.5.3 are vulnerable to this attack.

Please assign an identifier for this.

Thank you,
Ian Cordasco

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.