6.8
CVSSv2

CVE-2015-2296

Published: 18/03/2015 Updated: 18/03/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The resolve_redirects function in sessions.py in requests 2.1.0 up to and including 2.5.3 allows remote malicious users to conduct session fixation attacks via a cookie without a host value in a redirect.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mageia project mageia 4.0

python requests 2.1.0

python requests 2.2.1

python requests 2.3.0

python requests 2.4.1

python requests 2.4.3

python requests 2.5.0

python requests 2.5.1

python requests 2.5.2

python requests 2.4.0

python requests 2.4.2

python requests 2.5.3

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

Vendor Advisories

Debian Bug report logs - #780506 requests: CVE-2015-2296: session fixation and cookie stealing issue Package: src:requests; Maintainer for src:requests is Debian Python Modules Team <python-modules-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 15 Mar 2015 06:09:01 UTC ...
Requests could be made to expose cookies over the network ...
A flaw was found in the way python-requests set the domain cookie parameter for certain HTTP responses A remote attacker could use this flaw to modify a cookie to be sent to an arbitrary URL ...
A flaw was found in the way python-requests set the domain cookie parameter for certain HTTP responses A remote attacker could use this flaw to modify a cookie to be sent to an arbitrary URL ...
A flaw was found in the way python-requests set the domain cookie parameter for certain HTTP responses A remote attacker could use this flaw to modify a cookie to be sent to an arbitrary URL ...