vulnerability

SUSE: CVE-2018-20852: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 13, 2019
Added
Aug 9, 2019
Modified
Oct 22, 2021

Description

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

Solution(s)

suse-upgrade-firefox-atk-langsuse-upgrade-firefox-gdk-pixbuf-langsuse-upgrade-firefox-gdk-pixbuf-query-loaderssuse-upgrade-firefox-gdk-pixbuf-thumbnailersuse-upgrade-firefox-gio-branding-upstreamsuse-upgrade-firefox-glib2-langsuse-upgrade-firefox-glib2-toolssuse-upgrade-firefox-gtk3-branding-upstreamsuse-upgrade-firefox-gtk3-datasuse-upgrade-firefox-gtk3-immodule-amharicsuse-upgrade-firefox-gtk3-immodule-inuktitutsuse-upgrade-firefox-gtk3-immodule-multipresssuse-upgrade-firefox-gtk3-immodule-thaisuse-upgrade-firefox-gtk3-immodule-vietnamesesuse-upgrade-firefox-gtk3-immodule-ximsuse-upgrade-firefox-gtk3-immodules-tigrignasuse-upgrade-firefox-gtk3-langsuse-upgrade-firefox-gtk3-toolssuse-upgrade-firefox-libatk-1_0-0suse-upgrade-firefox-libcairo-gobject2suse-upgrade-firefox-libcairo2suse-upgrade-firefox-libffi4suse-upgrade-firefox-libffi7suse-upgrade-firefox-libgdk_pixbuf-2_0-0suse-upgrade-firefox-libgtk-3-0suse-upgrade-firefox-libharfbuzz0suse-upgrade-firefox-libpango-1_0-0suse-upgrade-libfirefox-gio-2_0-0suse-upgrade-libfirefox-glib-2_0-0suse-upgrade-libfirefox-gmodule-2_0-0suse-upgrade-libfirefox-gobject-2_0-0suse-upgrade-libfirefox-gthread-2_0-0suse-upgrade-libfreebl3suse-upgrade-libfreebl3-32bitsuse-upgrade-libpython2_6-1_0suse-upgrade-libpython2_6-1_0-32bitsuse-upgrade-libpython2_7-1_0suse-upgrade-libpython2_7-1_0-32bitsuse-upgrade-libpython3_4m1_0suse-upgrade-libpython3_4m1_0-32bitsuse-upgrade-libpython3_6m1_0suse-upgrade-libpython3_6m1_0-32bitsuse-upgrade-libsoftokn3suse-upgrade-libsoftokn3-32bitsuse-upgrade-mozilla-nsprsuse-upgrade-mozilla-nspr-32bitsuse-upgrade-mozilla-nspr-develsuse-upgrade-mozilla-nsssuse-upgrade-mozilla-nss-32bitsuse-upgrade-mozilla-nss-certssuse-upgrade-mozilla-nss-certs-32bitsuse-upgrade-mozilla-nss-develsuse-upgrade-mozilla-nss-toolssuse-upgrade-mozillafirefoxsuse-upgrade-mozillafirefox-branding-sledsuse-upgrade-mozillafirefox-translations-commonsuse-upgrade-mozillafirefox-translations-othersuse-upgrade-pythonsuse-upgrade-python-32bitsuse-upgrade-python-basesuse-upgrade-python-base-32bitsuse-upgrade-python-cursessuse-upgrade-python-demosuse-upgrade-python-develsuse-upgrade-python-docsuse-upgrade-python-doc-pdfsuse-upgrade-python-gdbmsuse-upgrade-python-idlesuse-upgrade-python-tksuse-upgrade-python-xmlsuse-upgrade-python3suse-upgrade-python3-32bitsuse-upgrade-python3-basesuse-upgrade-python3-base-32bitsuse-upgrade-python3-cursessuse-upgrade-python3-dbmsuse-upgrade-python3-develsuse-upgrade-python3-idlesuse-upgrade-python3-testsuitesuse-upgrade-python3-tksuse-upgrade-python3-toolssuse-upgrade-python36suse-upgrade-python36-base
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.