Skip to content

Vulnerability CVE-2021-28363 #1527

@kaos

Description

@kaos

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28363

Report excerpt:

Description from CVE
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.

Explanation
The urllib3 package is vulnerable to Improper Certificate Validation. The _connect_tls_proxy function in the connection.py file does not validate TLS certificate hostnames. A Man-in-the-Middle (MitM) attacker can leverage this vulnerability to decrypt and modify data in transit by providing a malicious certificate that exploits this issue.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions