The Huawei EulerOS 'python-urllib3' package before 1.24.2 for Python mishandles certain cases, leading to SSL connections succeeding in situations where a verification failure is the correct outcome (CVE-2019-11324). Affected package version: Huawei EulerOS Virtualization for ARM 64 3.0.5.0
Reporter | Title | Published | Views | Family All 142 |
---|---|---|---|---|
![]() | CVE-2019-11324 | 18 Apr 201921:29 | – | debiancve |
![]() | K000133448 : Python urllib3 vulnerability CVE-2019-11324 | 27 Apr 202300:00 | – | f5 |
![]() | Improper Certificate Validation in urllib3 | 19 Apr 201916:55 | – | github |
![]() | Improper Certificate Validation in urllib3 | 19 Apr 201916:55 | – | osv |
![]() | PYSEC-2019-133 | 18 Apr 201921:29 | – | osv |
![]() | CVE-2019-11324 | 18 Apr 201921:29 | – | osv |
![]() | python310-kubernetes-28.1.0-4.3 on GA media | 12 Jul 202400:00 | – | osv |
![]() | Red Hat Security Advisory: python-urllib3 security update | 18 Sep 202404:10 | – | osv |
![]() | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.11 packages update | 18 Sep 202404:08 | – | osv |
![]() | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.28 packages update | 18 Sep 202404:08 | – | osv |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2020.1084");
script_cve_id("CVE-2019-11324");
script_tag(name:"creation_date", value:"2020-01-23 13:19:57 +0000 (Thu, 23 Jan 2020)");
script_version("2024-02-05T14:36:56+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:56 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-04-19 17:12:26 +0000 (Fri, 19 Apr 2019)");
script_name("Huawei EulerOS: Security Advisory for python-urllib3 (EulerOS-SA-2020-1084)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRTARM64\-3\.0\.5\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2020-1084");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2020-1084");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'python-urllib3' package(s) announced via the EulerOS-SA-2020-1084 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.(CVE-2019-11324)");
script_tag(name:"affected", value:"'python-urllib3' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.5.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRTARM64-3.0.5.0") {
if(!isnull(res = isrpmvuln(pkg:"python2-urllib3", rpm:"python2-urllib3~1.23~4.h3.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.5.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo