urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
{
"binaries": [
{
"binary_version": "8.1.1-2ubuntu0.6+esm6",
"binary_name": "python-pip"
},
{
"binary_version": "8.1.1-2ubuntu0.6+esm6",
"binary_name": "python-pip-whl"
},
{
"binary_version": "8.1.1-2ubuntu0.6+esm6",
"binary_name": "python3-pip"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2",
"binary_name": "python-pip"
},
{
"binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2",
"binary_name": "python-pip-whl"
},
{
"binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2",
"binary_name": "python3-pip"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}