PYSEC-2019-178

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/elastic-apm/PYSEC-2019-178.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2019-178
Aliases
Published
2019-08-22T17:15:00Z
Modified
2023-11-01T04:51:03.047346Z
Summary
[none]
Details

When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing.

References

Affected packages

PyPI / elastic-apm

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.0

Affected versions

1.*

1.0.0.dev0
1.0.0.dev1
1.0.0.dev2
1.0.0.dev3
1.0.0

2.*

2.0.0
2.0.1
2.1.0
2.1.1
2.2.0
2.2.1

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.1.0
4.2.0
4.2.1
4.2.2

5.*

5.0.0