CVE-2021-28363

Severity
6.5MEDIUM
EPSS
0.1%
top 71.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 15
Latest updateOct 15

Description

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5

Affected Packages4 packages

NVDpython/urllib31.26.01.26.4
Debianpython-urllib3< 1.26.4-1+3
PyPIurllib31.26.01.26.4

Also affects: Fedora 34

Patches

🔴Vulnerability Details

4
OSV
Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection2021-03-19
GHSA
Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection2021-03-19
OSV
CVE-2021-28363: The urllib3 library 12021-03-15
CVEList
CVE-2021-28363: The urllib3 library 12021-03-15

📋Vendor Advisories

3
Oracle
Oracle Oracle PeopleSoft Risk Matrix: Porting (urllib3) — CVE-2021-283632021-10-15
Red Hat
python-urllib3: HTTPS proxy host name not validated when using default SSLContext2021-03-15
Debian
CVE-2021-28363: python-urllib3 - The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate valida...2021
CVE-2021-28363 (MEDIUM CVSS 6.5) | The urllib3 library 1.26.x before 1 | cvebase.io