CVE-2024-37891
CVE-2024-37891 in urllib3, a Python HTTP client library, involves a potential cross-origin redirect issue when the Proxy-Authorization
header is incorrectly configured without using proper proxy support. Urllib3 doesn't strip the header on cross-origin redirects, which could expose authentication material. The SVRS score of 30 indicates a low risk, but it's crucial to understand the nuances. While the CVSS score is 0, SOCRadar's SVRS considers external threat intelligence. The vulnerability requires specific conditions to be exploited, including setting the Proxy-Authorization
header without proxy support, not disabling HTTP redirects, and a redirect to a malicious origin. Users are advised to upgrade to urllib3 version 1.26.19 or 2.2.2 to mitigate this issue, but until then they can also use the built-in ProxyManager, disable redirects, or avoid using the Proxy-Authorization
header in unintended contexts. Although the risk is low, patching addresses unintentional exposure of authentication data during redirects.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.