vulnerability
Red Hat: CVE-2020-8492: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Jan 30, 2020 | Oct 1, 2020 | Mar 27, 2026 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Jan 30, 2020
Added
Oct 1, 2020
Modified
Mar 27, 2026
Description
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
Solutions
redhat-upgrade-cython-debugsourceredhat-upgrade-numpy-debugsourceredhat-upgrade-platform-pythonredhat-upgrade-platform-python-debugredhat-upgrade-platform-python-develredhat-upgrade-python-cffi-debugsourceredhat-upgrade-python-cryptography-debugsourceredhat-upgrade-python-lxml-debugsourceredhat-upgrade-python-markupsafe-debugsourceredhat-upgrade-python-psutil-debugsourceredhat-upgrade-python-psycopg2-debugsourceredhat-upgrade-python3redhat-upgrade-python3-debugredhat-upgrade-python3-debuginforedhat-upgrade-python3-debugsourceredhat-upgrade-python3-develredhat-upgrade-python3-idleredhat-upgrade-python3-libsredhat-upgrade-python3-testredhat-upgrade-python3-tkinterredhat-upgrade-python38redhat-upgrade-python38-asn1cryptoredhat-upgrade-python38-babelredhat-upgrade-python38-cffiredhat-upgrade-python38-cffi-debuginforedhat-upgrade-python38-chardetredhat-upgrade-python38-cryptographyredhat-upgrade-python38-cryptography-debuginforedhat-upgrade-python38-cythonredhat-upgrade-python38-cython-debuginforedhat-upgrade-python38-debugredhat-upgrade-python38-debuginforedhat-upgrade-python38-debugsourceredhat-upgrade-python38-develredhat-upgrade-python38-idleredhat-upgrade-python38-idnaredhat-upgrade-python38-jinja2redhat-upgrade-python38-libsredhat-upgrade-python38-lxmlredhat-upgrade-python38-lxml-debuginforedhat-upgrade-python38-markupsaferedhat-upgrade-python38-markupsafe-debuginforedhat-upgrade-python38-mod_wsgiredhat-upgrade-python38-numpyredhat-upgrade-python38-numpy-debuginforedhat-upgrade-python38-numpy-docredhat-upgrade-python38-numpy-f2pyredhat-upgrade-python38-pipredhat-upgrade-python38-pip-wheelredhat-upgrade-python38-plyredhat-upgrade-python38-psutilredhat-upgrade-python38-psutil-debuginforedhat-upgrade-python38-psycopg2redhat-upgrade-python38-psycopg2-debuginforedhat-upgrade-python38-psycopg2-docredhat-upgrade-python38-psycopg2-testsredhat-upgrade-python38-pycparserredhat-upgrade-python38-pymysqlredhat-upgrade-python38-pysocksredhat-upgrade-python38-pytzredhat-upgrade-python38-pyyamlredhat-upgrade-python38-pyyaml-debuginforedhat-upgrade-python38-requestsredhat-upgrade-python38-rpm-macrosredhat-upgrade-python38-scipyredhat-upgrade-python38-scipy-debuginforedhat-upgrade-python38-setuptoolsredhat-upgrade-python38-setuptools-wheelredhat-upgrade-python38-sixredhat-upgrade-python38-testredhat-upgrade-python38-tkinterredhat-upgrade-python38-urllib3redhat-upgrade-python38-wheelredhat-upgrade-python38-wheel-wheelredhat-upgrade-pyyaml-debugsourceredhat-upgrade-scipy-debugsource
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.