CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
76.3%
Issue Overview:
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. (CVE-2019-11236)
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument. (CVE-2019-11324)
Affected Packages:
python-pip
Issue Correction:
Run yum update python-pip to update your system.
New Packages:
noarch:
python27-pip-9.0.3-1.27.amzn1.noarch
python35-pip-9.0.3-1.27.amzn1.noarch
python26-pip-9.0.3-1.27.amzn1.noarch
python36-pip-9.0.3-1.27.amzn1.noarch
python34-pip-9.0.3-1.27.amzn1.noarch
src:
python-pip-9.0.3-1.27.amzn1.src
Red Hat: CVE-2019-11236, CVE-2019-11324
Mitre: CVE-2019-11236, CVE-2019-11324
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | noarch | python27-pip | < 9.0.3-1.27.amzn1 | python27-pip-9.0.3-1.27.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | python35-pip | < 9.0.3-1.27.amzn1 | python35-pip-9.0.3-1.27.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | python26-pip | < 9.0.3-1.27.amzn1 | python26-pip-9.0.3-1.27.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | python36-pip | < 9.0.3-1.27.amzn1 | python36-pip-9.0.3-1.27.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | python34-pip | < 9.0.3-1.27.amzn1 | python34-pip-9.0.3-1.27.amzn1.noarch.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
76.3%