ALAS-2019-1258

Related Vulnerabilities: CVE-2019-10160   CVE-2019-9948  

A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.(CVE-2019-10160) urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.(CVE-2019-9948)

ALAS-2019-1258


Amazon Linux AMI Security Advisory: ALAS-2019-1258
Advisory Release Date: 2019-08-07 23:02 Pacific
Advisory Updated Date: 2019-08-12 18:22 Pacific
Severity: Important

Issue Overview:

A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.(CVE-2019-10160)

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.(CVE-2019-9948)


Affected Packages:

python27


Issue Correction:
Run yum update python27 to update your system.

New Packages:
i686:
    python27-2.7.16-1.129.amzn1.i686
    python27-devel-2.7.16-1.129.amzn1.i686
    python27-debuginfo-2.7.16-1.129.amzn1.i686
    python27-tools-2.7.16-1.129.amzn1.i686
    python27-libs-2.7.16-1.129.amzn1.i686
    python27-test-2.7.16-1.129.amzn1.i686

src:
    python27-2.7.16-1.129.amzn1.src

x86_64:
    python27-2.7.16-1.129.amzn1.x86_64
    python27-libs-2.7.16-1.129.amzn1.x86_64
    python27-test-2.7.16-1.129.amzn1.x86_64
    python27-devel-2.7.16-1.129.amzn1.x86_64
    python27-tools-2.7.16-1.129.amzn1.x86_64
    python27-debuginfo-2.7.16-1.129.amzn1.x86_64