CVE-2019-10160

high-risk
Published 2019-06-07

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.

Do I need to act?

~
1.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: c2f86d86e6c8f5fd1ef602128b537a48f3f5c063, ac39a516017c80993309f803441c8ee97c44838e, 201c8f79450628241574fba940e08107178dc3a5, e09359112e250268eca209355abeb17abf822486, 250b62acc59921d399f0db47db3b462cd6037e09, 8d0ef0b5edeae52960c7ed05ae8a12388324f87e, f61599b050c621386a3fc6bc480359e2d3bb93de, fd1771dbdd28709716bd531580c40ae5ed814468
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

References (56)

and 36 more references
58
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 5/34 · Minimal
Exposure 21/34 · High