ALAS-2019-1204

Related Vulnerabilities: CVE-2019-9636   CVE-2019-9740   CVE-2019-9947  

Python is affected by improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. (CVE-2019-9636) An issue was discovered in urllib2 in Python 3.6. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.(CVE-2019-9740) An issue was discovered in urllib2 in Python 3.6. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.(CVE-2019-9947)

ALAS-2019-1204


Amazon Linux AMI Security Advisory: ALAS-2019-1204
Advisory Release Date: 2019-05-29 19:20 Pacific
Advisory Updated Date: 2019-08-06 21:28 Pacific
Severity: Important

Issue Overview:

Python is affected by improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. (CVE-2019-9636)

An issue was discovered in urllib2 in Python 3.6. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.(CVE-2019-9740)

An issue was discovered in urllib2 in Python 3.6. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.(CVE-2019-9947)


Affected Packages:

python36


Issue Correction:
Run yum update python36 to update your system.

New Packages:
i686:
    python36-debuginfo-3.6.8-1.13.amzn1.i686
    python36-debug-3.6.8-1.13.amzn1.i686
    python36-devel-3.6.8-1.13.amzn1.i686
    python36-tools-3.6.8-1.13.amzn1.i686
    python36-3.6.8-1.13.amzn1.i686
    python36-libs-3.6.8-1.13.amzn1.i686
    python36-test-3.6.8-1.13.amzn1.i686

src:
    python36-3.6.8-1.13.amzn1.src

x86_64:
    python36-devel-3.6.8-1.13.amzn1.x86_64
    python36-libs-3.6.8-1.13.amzn1.x86_64
    python36-3.6.8-1.13.amzn1.x86_64
    python36-tools-3.6.8-1.13.amzn1.x86_64
    python36-debug-3.6.8-1.13.amzn1.x86_64
    python36-test-3.6.8-1.13.amzn1.x86_64
    python36-debuginfo-3.6.8-1.13.amzn1.x86_64