CVE-2021-28363

EUVD-2021-0457
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Affected Products (NVD)
VendorProductVersion
pythonurllib3
1.26.0 ≤
𝑥
< 1.26.4
oraclepeoplesoft_enterprise_peopletools
8.59
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-urllib3
bookworm
1.26.12-1
fixed
bullseye
1.26.5-1~exp1
fixed
buster
not-affected
sid
2.0.7-2
fixed
stretch
not-affected
trixie
2.0.7-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-pip
bionic
not-affected
focal
not-affected
groovy
not-affected
trusty
not-affected
xenial
not-affected
python-urllib3
bionic
not-affected
focal
not-affected
groovy
not-affected
trusty
not-affected
xenial
not-affected