Debian Python-Urllib3 vulnerabilities
18 known vulnerabilities affecting debian/python-urllib3.
Total CVEs
18
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH7MEDIUM6LOW3
Vulnerabilities
Page 1 of 1
CVE-2026-21441HIGHCVSS 8.9fixed in python-urllib3 1.26.12-1+deb12u3 (bookworm)2026
CVE-2026-21441 [HIGH] CVE-2026-21441: python-urllib3 - urllib3 is an HTTP client library for Python. urllib3's streaming API is designe...
urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zs
debian
CVE-2025-66471HIGHCVSS 8.9fixed in python-urllib3 2.6.3-1 (forky)2025
CVE-2025-66471 [HIGH] CVE-2025-66471: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. Starting in version 1...
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When strea
debian
CVE-2025-66418HIGHCVSS 8.9fixed in python-urllib3 1.26.12-1+deb12u2 (bookworm)2025
CVE-2025-66418 [HIGH] CVE-2025-66418: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. Starting in version 1...
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fix
debian
CVE-2025-50181MEDIUMCVSS 5.3fixed in python-urllib3 1.26.12-1+deb12u2 (bookworm)2025
CVE-2025-50181 [MEDIUM] CVE-2025-50181: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is...
urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabli
debian
CVE-2025-50182LOWCVSS 5.3fixed in python-urllib3 2.3.0-3 (forky)2025
CVE-2025-50182 [MEDIUM] CVE-2025-50182: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. Starting in version 2...
urllib3 is a user-friendly HTTP client library for Python. Starting in version 2.2.0 and prior to 2.5.0, urllib3 does not control redirects in browsers and Node.js. urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means Python libraries can be used to make HTTP requests from a browse
debian
CVE-2024-37891MEDIUMCVSS 4.4fixed in python-urllib3 1.26.12-1+deb12u1 (bookworm)2024
CVE-2024-37891 [MEDIUM] CVE-2024-37891: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. When using urllib3's ...
urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even thoug
debian
CVE-2023-45803MEDIUMCVSS 4.2fixed in python-urllib3 1.26.12-1+deb12u1 (bookworm)2023
CVE-2023-45803 [MEDIUM] CVE-2023-45803: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wo...
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the
debian
CVE-2023-43804MEDIUMCVSS 5.9fixed in python-urllib3 1.26.12-1+deb12u1 (bookworm)2023
CVE-2023-43804 [MEDIUM] CVE-2023-43804: python-urllib3 - urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat...
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user
debian
CVE-2021-33503HIGHCVSS 7.5fixed in python-urllib3 1.26.5-1~exp1 (bookworm)2021
CVE-2021-33503 [HIGH] CVE-2021-33503: python-urllib3 - An issue was discovered in urllib3 before 1.26.5. When provided with a URL conta...
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
Scope: local
bookworm: resolved (fixed in 1.26.5-1~exp1)
debian
CVE-2021-28363MEDIUMCVSS 6.5fixed in python-urllib3 1.26.4-1 (bookworm)2021
CVE-2021-28363 [MEDIUM] CVE-2021-28363: python-urllib3 - The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate valida...
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the defa
debian
CVE-2020-26137HIGHCVSS 7.2fixed in python-urllib3 1.25.9-1 (bookworm)2020
CVE-2020-26137 [HIGH] CVE-2020-26137: python-urllib3 - urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP re...
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Scope: local
bookworm: resolved (fixed in 1.25.9-1)
bullseye: resolved (fixed in 1.25.9-1)
forky: resolved (fixed in 1.25.9-1)
si
debian
CVE-2020-7212HIGHCVSS 7.5fixed in python-urllib3 1.25.8-1 (bookworm)2020
CVE-2020-7212 [HIGH] CVE-2020-7212: python-urllib3 - The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 ...
The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next
debian
CVE-2019-11324HIGHCVSS 7.5fixed in python-urllib3 1.25.6-4 (bookworm)2019
CVE-2019-11324 [HIGH] CVE-2019-11324: python-urllib3 - The urllib3 library before 1.24.2 for Python mishandles certain cases where the ...
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
Scope: lo
debian
CVE-2019-11236MEDIUMCVSS 6.1fixed in python-urllib3 1.25.6-4 (bookworm)2019
CVE-2019-11236 [MEDIUM] CVE-2019-11236: python-urllib3 - In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if ...
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
Scope: local
bookworm: resolved (fixed in 1.25.6-4)
bullseye: resolved (fixed in 1.25.6-4)
forky: resolved (fixed in 1.25.6-4)
sid: resolved (fixed in 1.25.6-4)
trixie: resolved (fixed in 1.25.6-4)
debian
CVE-2018-20060CRITICALCVSS 9.8fixed in python-urllib3 1.24-1 (bookworm)2018
CVE-2018-20060 [CRITICAL] CVE-2018-20060: python-urllib3 - urllib3 before version 1.23 does not remove the Authorization HTTP header when f...
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
Scope: local
bookworm: resolved (fixed in 1.24-1)
bullseye: reso
debian
CVE-2018-25091CRITICALCVSS 9.8fixed in python-urllib3 1.25.6-4 (bookworm)2018
CVE-2018-25091 [CRITICAL] CVE-2018-25091: python-urllib3 - urllib3 before 1.24.2 does not remove the authorization HTTP header when followi...
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-2006
debian
CVE-2016-9015LOWCVSS 3.72016
CVE-2016-9015 [LOW] CVE-2016-9015: python-urllib3 - Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability...
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the u
debian
CVE-2013-2099LOWCVSS 4.3fixed in bzr 2.6.0~bzr6574-1 (bookworm)2013
CVE-2013-2099 [MEDIUM] CVE-2013-2099: bzr - Algorithmic complexity vulnerability in the ssl.match_hostname function in Pytho...
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Scope: local
bookworm:
debian