Amazon Linux 2 Security Advisory: ALAS-2020-1413
Advisory Release Date: 2020-04-20 20:48 Pacific
Advisory Updated Date: 2020-04-23 23:23 Pacific
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. (CVE-2018-20060)
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. (CVE-2019-11236)
A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected (302) from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user's valid credentials. (CVE-2018-18074)
Affected Packages:
python-virtualenv
Issue Correction:
Run yum update python-virtualenv to update your system.
noarch:
python-virtualenv-15.1.0-4.amzn2.noarch
src:
python-virtualenv-15.1.0-4.amzn2.src