CVE-2019-10160

Source
https://cve.org/CVERecord?id=CVE-2019-10160
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10160.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-10160
Aliases
Downstream
Related
Published
2019-06-07T18:29:00.280Z
Modified
2026-02-24T11:31:04.799355Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.

References

Affected packages

Git
github.com/python/cpython

Affected ranges

Type
GIT
Repo
https://github.com/python/cpython
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10160.json"
gitlab.com/libtiff/libtiff

Affected ranges

Type
GIT
Repo
https://gitlab.com/libtiff/libtiff
Events

Affected versions

v3.*
v3.7.0
v3.7.1
v3.7.2
v3.7.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10160.json"
gitlab.gnome.org/GNOME/evince

Affected ranges

Type
GIT
Repo
https://gitlab.gnome.org/GNOME/evince
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*
3.1.2
3.1.90
3.1.90.1
3.2.0
3.2.1
3.3.2
3.3.3
3.3.3.1
3.3.4
3.3.5
3.3.90
3.3.92
3.4.0
3.5.2
3.5.3
3.5.4
3.5.5
3.5.90
3.5.92
3.6.0
3.7.1
Other
BEFORE_GNOME_PRINT
BEFORE_NEW_UI_HANDLER_1
BEFORE_XPDF_3_MERGE
BONOBO_BEFORE_API_RENAME
ChangeLog
EAZEL-NAUTILUS-MS-AUG07
EAZEL-NAUTILUS-MS-JULY_5
EVINCE_0_1_0
EVINCE_0_1_1
EVINCE_0_1_3
EVINCE_0_1_4
EVINCE_0_1_5
EVINCE_0_1_6
EVINCE_0_1_7
EVINCE_0_1_8
EVINCE_0_1_9
EVINCE_0_2_0
EVINCE_0_2_1
EVINCE_0_3_0
EVINCE_0_3_1
EVINCE_0_3_3
EVINCE_0_4_0
EVINCE_0_5_0
EVINCE_0_5_1
EVINCE_0_5_2
EVINCE_0_5_3
EVINCE_0_5_4
EVINCE_0_5_5
EVINCE_0_6_0
EVINCE_0_6_1
EVINCE_0_7_0
EVINCE_0_7_1
EVINCE_0_7_2
EVINCE_0_8_0
EVINCE_0_8_1
EVINCE_0_9_0
EVINCE_0_9_1
EVINCE_0_9_2
EVINCE_0_9_3
EVINCE_2_19_4
EVINCE_2_19_92
EVINCE_2_20_0
EVINCE_2_21_1
EVINCE_2_21_90
EVINCE_2_21_91
EVINCE_2_22_0
EVINCE_2_22_1
EVINCE_2_22_1_1
EVINCE_2_23_4
EVINCE_2_23_5
EVINCE_2_23_91
EVINCE_2_23_92
EVINCE_2_24_0
EVINCE_2_24_1
EVINCE_2_25_1
EVINCE_2_25_2
EVINCE_2_25_4
EVINCE_2_25_5
EVINCE_2_25_90
EVINCE_2_25_91
EVINCE_2_25_92
EVINCE_2_26_0
EVINCE_2_27_1
EVINCE_2_27_3
EVINCE_2_27_4
EVINCE_2_27_90
EVINCE_2_29_1
EVINCE_2_29_2
EVINCE_2_29_3
EVINCE_2_29_4
EVINCE_2_29_5
EVINCE_2_29_91
EVINCE_2_29_92
EVINCE_2_30_0
EVINCE_2_31_1
EVINCE_2_31_2
EVINCE_2_31_3
EVINCE_2_31_4
EVINCE_2_31_4_1
EVINCE_2_31_5
EVINCE_2_31_6
EVINCE_2_31_6_1
EVINCE_2_31_90
EVINCE_2_91_0
EVINCE_2_91_1
EVINCE_2_91_2
EVINCE_2_91_3
EVINCE_2_91_4
EVINCE_2_91_5
EVINCE_2_91_6
EVINCE_2_91_90
EVINCE_2_91_92
EVINCE_2_91_93
EVINCE_3_0_0
GNOME_2_12_BRANCHPOINT
GNOME_2_14_BRANCHPOINT
GNOME_2_16_BRANCHPOINT
GNOME_2_4_ANCHOR
GNOME_2_6_ANCHOR
GNOME_2_8_ANCHOR
GPDF_0_100
GPDF_0_101
GPDF_0_102
GPDF_0_103
GPDF_0_104
GPDF_0_105
GPDF_0_106
GPDF_0_110
GPDF_0_111
GPDF_0_112
GPDF_0_112_1
GPDF_0_120
GPDF_0_121
GPDF_0_122
GPDF_0_123
GPDF_0_124
GPDF_0_125
GPDF_0_130
GPDF_0_131
GPDF_2_7_1
GPDF_2_7_2
GPDF_2_7_90
GPDF_2_7_91
GPDF_2_8_0
GPDF_2_8_1
GPDF_2_9_1
GPDF_FOR_GNOME_1_4
GPDF_MODES_ANCHOR
GPDF_OUTLINES_ANCHOR
XPDF_0_80
XPDF_1_01
XPDF_2_00
XPDF_2_01
XPDF_2_02
XPDF_2_03
XPDF_3_00
nautilus_ms_may_31
start

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10160.json"