Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2019-9636: Security patch for python34 ((Multiple Advisories))

Back to Search

Amazon Linux AMI: CVE-2019-9636: Security patch for python34 ((Multiple Advisories))

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
03/08/2019
Created
05/08/2019
Added
05/07/2019
Modified
11/23/2019

Description

Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly.

Solution(s)

  • amazon-linux-upgrade-python27
  • amazon-linux-upgrade-python34
  • amazon-linux-upgrade-python35
  • amazon-linux-upgrade-python36

References

  • amazon-linux-upgrade-python27
  • amazon-linux-upgrade-python34
  • amazon-linux-upgrade-python35
  • amazon-linux-upgrade-python36

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;