Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 543480 (CVE-2015-2296) - <dev-python/requests-2.6.0: multiple vulnerabilities (CVE-2015-2296)
Summary: <dev-python/requests-2.6.0: multiple vulnerabilities (CVE-2015-2296)
Status: RESOLVED FIXED
Alias: CVE-2015-2296
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa/cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-16 08:11 UTC by Agostino Sarubbo
Modified: 2015-08-04 16:06 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-03-16 08:11:10 UTC
From ${URL} :

Last night, Matthew Daley (CC'd on this email) privately disclosed to
the requests project a vulnerability in requests which has now been
fixed in requests v2.6.0
(https://warehouse.python.org/project/requests/2.6.0/) by this commit:
https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc.

The following is the relevant excerpts from the description provided by Matthew:

The issue occurs when Requests is handling a HTTP response that is a
redirection and that also sets cookies without an explicit domain
parameter. Instead of the cookies only being set for the domain which
sent the HTTP response, they are also sent to the redirection target,
regardless of its domain.

The issue could be exploited in the following ways:
* If you are the redirection source (ie. you can make Requests hit
your URL), you can make Requests perform a request to any third-party
domain with cookies of your choosing. This may be useful in performing
a session fixation attack.
* If you are the redirection target (ie. you can make a third-party
site redirect to your URL), you are able to steal any cookies set by
the third-party redirection.

The change that introduced this vulnerability was first included in
version 2.1.0 of requests. As such every version since that version up
to and including 2.5.3 are vulnerable to this attack.



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Arfrever Frehtes Taifersar Arahesis 2015-04-16 06:51:28 UTC
*requests-2.6.0 (26 Mar 2015)

  26 Mar 2015; Patrick Lauer <patrick@gentoo.org> +requests-2.6.0.ebuild:
  Bump
Comment 2 Justin Lecher (RETIRED) gentoo-dev 2015-04-16 07:00:22 UTC
@arches please stabilize

dev-python/requests-2.6.0
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2015-04-17 04:35:00 UTC
Stable for HPPA.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2015-04-17 04:46:44 UTC
Arches, please test and mark stable:

=dev-python/requests-2.6.0

Target Keywords : "alpha amd64 arm hppa ia64 ppc ppc64 spark x86"

Thank you!
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2015-04-17 04:47:42 UTC
CVE-2015-2296 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2296):
  The resolve_redirects function in sessions.py in requests 2.1.0 through
  2.5.3 allows remote attackers to conduct session fixation attacks via a
  cookie without a host value in a redirect.
Comment 6 Agostino Sarubbo gentoo-dev 2015-04-17 07:20:07 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2015-04-17 07:20:49 UTC
x86 stable
Comment 8 Agostino Sarubbo gentoo-dev 2015-04-17 12:46:24 UTC
ppc64 stable
Comment 9 Pacho Ramos gentoo-dev 2015-04-21 19:23:47 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2015-04-28 07:31:03 UTC
alpha stable
Comment 11 Agostino Sarubbo gentoo-dev 2015-04-28 07:47:32 UTC
ia64 stable
Comment 12 Agostino Sarubbo gentoo-dev 2015-04-29 09:20:03 UTC
sparc stable
Comment 13 Markus Meier gentoo-dev 2015-05-21 16:35:13 UTC
arm stable, all arches done.
Comment 14 Justin Lecher (RETIRED) gentoo-dev 2015-05-21 18:10:42 UTC
+  21 May 2015; Justin Lecher <jlec@gentoo.org>
+  -files/requests-1.2.0-system-cacerts.patch,
+  -files/requests-1.2.0-system-libs.patch,
+  -files/requests-1.2.1-urllib3-py3.patch, -requests-2.3.0.ebuild:
+  Drop vulnerable version, bug #543480
+


Cleaned.
Comment 15 Yury German Gentoo Infrastructure gentoo-dev 2015-06-06 16:06:49 UTC
Arches and Maintainer(s), Thank you for your work.

Security Please Vote
First GLSA Vote: Yes
Comment 16 Tobias Heinlein (RETIRED) gentoo-dev 2015-06-30 22:39:56 UTC
I vote NO, tiebreaker required.
Comment 17 Chris Reffett (RETIRED) gentoo-dev Security 2015-07-01 18:24:42 UTC
Vote: NO, closing.