Debian Httpie vulnerabilities

4 known vulnerabilities affecting debian/httpie.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2LOW1

Vulnerabilities

Page 1 of 1
CVE-2023-48052LOWCVSS 7.42023
CVE-2023-48052 [HIGH] CVE-2023-48052: httpie - Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdro... Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on communications between the host and server via a man-in-the-middle attack. Scope: local bookworm: open bullseye: resolved forky: open sid: open trixie: open
debian
CVE-2022-0430MEDIUMCVSS 5.3fixed in httpie 3.2.1-1 (bookworm)2022
CVE-2022-0430 [MEDIUM] CVE-2022-0430: httpie - Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ... Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0. Scope: local bookworm: resolved (fixed in 3.2.1-1) bullseye: open forky: resolved (fixed in 3.2.1-1) sid: resolved (fixed in 3.2.1-1) trixie: resolved (fixed in 3.2.1-1)
debian
CVE-2022-24737MEDIUMCVSS 6.5fixed in httpie 3.2.1-1 (bookworm)2022
CVE-2022-24737 [MEDIUM] CVE-2022-24737: httpie - HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessio... HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookie
debian
CVE-2019-10751HIGHCVSS 8.8fixed in httpie 1.0.3-1 (bookworm)2019
CVE-2019-10751 [HIGH] CVE-2019-10751: httpie - All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open... All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control. Scope: local bookworm: resolved (fixed in 1.0.3-1) bullseye: resolved
debian