|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for python (EulerOS-SA-2019-1866)|
|Summary:||The remote host is missing an update for the Huawei EulerOS 'python' package(s) announced via the EulerOS-SA-2019-1866 advisory.|
The remote host is missing an update for the Huawei EulerOS 'python' package(s) announced via the EulerOS-SA-2019-1866 advisory.
A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.(CVE-2019-10160)
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.(CVE-2019-9948)
'python' package(s) on Huawei EulerOS V2.0SP2.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2019-9948|
BugTraq ID: 107549
Bugtraq: 20191021 [slackware-security] python (SSA:2019-293-01) (Google Search)
RedHat Security Advisories: RHSA-2019:1700
RedHat Security Advisories: RHSA-2019:2030
RedHat Security Advisories: RHSA-2019:3335
RedHat Security Advisories: RHSA-2019:3520
SuSE Security Announcement: openSUSE-SU-2019:1273 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:1580 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.