5
CVSSv2

CVE-2019-9636

Published: 08/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Python 2.7.x up to and including 2.7.16 and 3.x up to and including 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

python python

fedoraproject fedora 28

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

opensuse leap 42.3

opensuse leap 15.0

opensuse leap 15.1

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server aus 7.4

redhat enterprise linux 7.5

redhat enterprise linux server tus 7.4

redhat enterprise linux eus 7.5

redhat openshift container platform 3.11

redhat enterprise linux 8.0

redhat enterprise linux eus 8.1

redhat enterprise linux server eus 5.6

redhat enterprise linux eus 8.2

redhat enterprise linux server tus 8.2

redhat enterprise linux server aus 8.2

redhat enterprise linux server tus 8.4

redhat enterprise linux eus 8.4

redhat enterprise linux server aus 8.4

redhat enterprise linux server tus 8.6

redhat enterprise linux eus 8.6

redhat virtualization 4.0

oracle sun zfs storage appliance kit 8.8.6

Vendor Advisories

Debian Bug report logs - #924072 python37: CVE-2019-9636: urlsplit does not handle NFKC normalization Package: src:python37; Maintainer for src:python37 is Matthias Klose <doko@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 9 Mar 2019 10:18:01 UTC Severity: important Tags: security, ...
Several security issues were fixed in Python ...
Synopsis Important: python security update Type/Severity Security Advisory: Important Topic An update for python is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Synopsis Important: python security update Type/Severity Security Advisory: Important Topic An update for python is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: python27:27 security update Type/Severity Security Advisory: Important Topic An update for the python27:27 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Syst ...
Synopsis Important: python27-python security update Type/Severity Security Advisory: Important Topic An update for python27-python is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System ...
Synopsis Important: rh-python36-python security update Type/Severity Security Advisory: Important Topic An update for rh-python36-python is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: python security update Type/Severity Security Advisory: Important Topic An update for python is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Synopsis Important: python27-python security update Type/Severity Security Advisory: Important Topic An update for python27-python is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System ...
Synopsis Important: python security update Type/Severity Security Advisory: Important Topic An update for python is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Synopsis Important: python security update Type/Severity Security Advisory: Important Topic An update for python is now available for Red Hat Enterprise Linux 74 Advanced Update Support, Red Hat Enterprise Linux 74 Telco Extended Update Support, and Red Hat Enterprise Linux 74 Update Services for SAP Sol ...
Synopsis Important: python3 security update Type/Severity Security Advisory: Important Topic An update for python3 is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Important: rh-python35-python security update Type/Severity Security Advisory: Important Topic An update for rh-python35-python is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: Red Hat Virtualization security update Type/Severity Security Advisory: Important Topic An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Impo ...
Impact: Important Public Date: 2019-03-06 CWE: CWE-200 Bugzilla: 1688543: CVE-2019-9636 python: Informa ...
Python 27x through 2716 and 3x through 372 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization The impact is: Information disclosure (credentials, cookies, etc that are cached against a given hostname) The components are: urllibparseurlsplit, urllibparseurlparse The attack vector ...
A null pointer dereference vulnerability was found in the certificate parsing code in Python This causes a denial of service to applications when parsing specially crafted certificates This vulnerability is unlikely to be triggered if application enables SSL/TLS certificate validation and accepts certificates only from trusted root certificate au ...
Python 27x through 2716 and 3x through 372 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization The impact is: Information disclosure (credentials, cookies, etc that are cached against a given hostname) The components are: urllibparseurlsplit, urllibparseurlparse The attack vector ...
A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it ...
Python is affected by improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization The impact is: Information disclosure (credentials, cookies, etc that are cached against a given hostname) The components are: urllibparseurlsplit, urllibparseurlparse The attack vector is: A specially crafted URL could be incorr ...
Python 27x through 2716 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization The impact is: Information disclosure (credentials, cookies, etc that are cached against a given hostname) The components are: urllibparseurlsplit, urllibparseurlparse The attack vector is: A specially craf ...
An issue was discovered in urllib2 in Python 2x and urllib in Python 3x CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllibrequesturlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command (CVE-2019-9740, CVE-2019-9947) ...
Python is affected by improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization The impact is information disclosure (credentials, cookies, etc that are cached against a given hostname) The components are: urllibparseurlsplit, urllibparseurlparse The attack vector is: A specially crafted URL could be incorre ...

Recent Articles

Yo, sysadmins! Thought Patch Tuesday was big? Oracle says 'hold my Java' with huge 334 security flaw fix bundle
The Register • Shaun Nichols in San Francisco • 15 Jan 2020

House of Larry delivers massive update for 93 products Updated your WordPress plugins lately? Here are 320,000 auth-bypassing reasons why you should

Oracle has released a sweeping set of security patches across the breadth of its software line. The January update, delivered one day after Microsoft, Intel, Adobe, and others dropped their scheduled monthly patches, addresses a total of 334 security vulnerabilities across 93 different products from the enterprise giant. As you may imagine, most IT admins will only need to test and apply a handful of the updates for their specific platforms. For Oracle's flagship Database Server, the update incl...

References

NVD-CWE-noinfohttps://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.htmlhttps://github.com/python/cpython/pull/12201https://bugs.python.org/issue36216http://www.securityfocus.com/bid/107400https://access.redhat.com/errata/RHSA-2019:0710https://access.redhat.com/errata/RHSA-2019:0765https://access.redhat.com/errata/RHSA-2019:0806http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.htmlhttps://access.redhat.com/errata/RHSA-2019:0902https://access.redhat.com/errata/RHSA-2019:0997https://access.redhat.com/errata/RHSA-2019:0981https://access.redhat.com/errata/RHBA-2019:0959http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.htmlhttps://security.netapp.com/advisory/ntap-20190517-0001/https://access.redhat.com/errata/RHSA-2019:1467http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.htmlhttps://lists.debian.org/debian-lts-announce/2019/06/msg00022.htmlhttps://lists.debian.org/debian-lts-announce/2019/06/msg00023.htmlhttps://access.redhat.com/errata/RHBA-2019:0763https://access.redhat.com/errata/RHBA-2019:0764http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.htmlhttps://usn.ubuntu.com/4127-2/https://usn.ubuntu.com/4127-1/https://access.redhat.com/errata/RHSA-2019:2980https://access.redhat.com/errata/RHSA-2019:3170https://www.oracle.com/security-alerts/cpujan2020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.htmlhttps://security.gentoo.org/glsa/202003-26https://lists.debian.org/debian-lts-announce/2020/07/msg00011.htmlhttps://lists.debian.org/debian-lts-announce/2020/08/msg00034.htmlhttps://www.oracle.com/security-alerts/cpujul2022.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L25RTMKCF62DLC2XVSNXGX7C7HXISLVM/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFBAAGM27H73OLYBUA2IAZFSUN6KGLME/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFAXBEY2TGOBDRKTR556JBXBVFSAKD6I/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924072https://nvd.nist.govhttps://usn.ubuntu.com/4127-2/https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01