Bug 37069 - requests: Information disclosure (4.0)
requests: Information disclosure (4.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P3 normal (vote)
: UCS 4.0-3-errata
Assigned To: Daniel Tröder
Stefan Gohmann
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-11-27 09:14 CET by Moritz Muehlenhoff
Modified: 2017-10-26 13:54 CEST (History)
3 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-11-27 09:14:24 CET
Information leak of Authorization and Proxy-Authorization headers in redirected requests (CVE-2014-1829, CVE-2014-1830)
Comment 1 Arvid Requate univentionstaff 2015-05-06 18:46:18 CEST
Fixed in upstream Debian package version 0.12.1-1+deb7u1
Comment 2 Daniel Tröder univentionstaff 2015-09-02 17:26:47 CEST
requests 0.12.1-1+deb7u1 was imported and build to scope errata4.0-3.
YAML (r63409): 2015-09-02-requests.yaml
Comment 3 Stefan Gohmann univentionstaff 2015-09-08 08:32:04 CEST
YAML: OK

Tests: OK

>>> import requests
>>> 
>>> r = requests.get('https://api.github.com', auth=('user', 'pass'))
>>> print r.status_code
401
>>> print r.headers['content-type']
application/json; charset=utf-8
>>>
Comment 4 Janek Walkenhorst univentionstaff 2015-09-09 12:51:59 CEST
<http://errata.software-univention.de/ucs/4.0/308.html>