Aller au contenu
appaloosa scout logo main rounded
MEDIUM 5.3

CVE-2018-20852

EN http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS 1.7% percentile 82.3%

Apps suivies affectées

Configurations CPE vulnérables

Vendor Produit Plateforme Versions CPE 2.3 URI
python python Windows ≥2.0 ≤2.7.16 cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
python python Windows ≥3.0.0 <3.4.10 cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
python python Windows ≥3.5.0 <3.5.7 cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
python python Windows ≥3.6.0 <3.6.9 cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
python python Windows ≥3.7.0 <3.7.3 cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Voir sur NVD ↗