CVE-2019-9948

Related Vulnerabilities: CVE-2019-9948  

Impact: Moderate Public Date: 2019-03-23 CWE: CWE-358 Bugzilla: 1695570: CVE-2019-9948 python-urllib3: python urllib security bypass urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.

The MITRE CVE dictionary describes this issue as:

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.

Find out more about CVE-2019-9948 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Virtualization 4 python-urllib3 Under investigation
Red Hat Satellite 5 python-urllib3 Under investigation
Red Hat OpenStack Platform 9.0 python-urllib3 Under investigation
Red Hat OpenStack Platform 8.0 (Liberty) python-urllib3 Under investigation
Red Hat OpenStack Platform 14.0 (Rocky) python-urllib3 Under investigation
Red Hat OpenStack Platform 13.0 (Queens) python-urllib3 Under investigation
Red Hat OpenStack Platform 10 python-urllib3 Under investigation
Red Hat Gluster Storage 3 python-urllib3 Under investigation
Red Hat Enterprise Linux 7 python-urllib3 Under investigation
Red Hat Enterprise Linux 6 python-urllib3 Under investigation