Lucene search

K
amazonAmazonALAS-2019-1204
HistoryMay 29, 2019 - 7:20 p.m.

Important: python36

2019-05-2919:20:00
alas.aws.amazon.com
229

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

80.4%

Issue Overview:

Python is affected by improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. (CVE-2019-9636)

An issue was discovered in urllib2 in Python 3.6. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.(CVE-2019-9740)

An issue was discovered in urllib2 in Python 3.6. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.(CVE-2019-9947)

Affected Packages:

python36

Issue Correction:
Run yum update python36 to update your system.

New Packages:

i686:  
    python36-debuginfo-3.6.8-1.13.amzn1.i686  
    python36-debug-3.6.8-1.13.amzn1.i686  
    python36-devel-3.6.8-1.13.amzn1.i686  
    python36-tools-3.6.8-1.13.amzn1.i686  
    python36-3.6.8-1.13.amzn1.i686  
    python36-libs-3.6.8-1.13.amzn1.i686  
    python36-test-3.6.8-1.13.amzn1.i686  
  
src:  
    python36-3.6.8-1.13.amzn1.src  
  
x86_64:  
    python36-devel-3.6.8-1.13.amzn1.x86_64  
    python36-libs-3.6.8-1.13.amzn1.x86_64  
    python36-3.6.8-1.13.amzn1.x86_64  
    python36-tools-3.6.8-1.13.amzn1.x86_64  
    python36-debug-3.6.8-1.13.amzn1.x86_64  
    python36-test-3.6.8-1.13.amzn1.x86_64  
    python36-debuginfo-3.6.8-1.13.amzn1.x86_64  

Additional References

Red Hat: CVE-2019-9636, CVE-2019-9740, CVE-2019-9947

Mitre: CVE-2019-9636, CVE-2019-9740, CVE-2019-9947

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

80.4%