CVE-2021-28363

NameCVE-2021-28363
DescriptionThe urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-urllib3 (PTS)bullseye1.26.5-1~exp1fixed
bookworm1.26.12-1fixed
sid, trixie2.0.7-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-urllib3sourcestretch(not affected)
python-urllib3sourcebuster(not affected)
python-urllib3source(unstable)1.26.4-1

Notes

[buster] - python-urllib3 <not-affected> (Vulnerable code introduced later)
[stretch] - python-urllib3 <not-affected> (Vulnerable code introduced later)
https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r
Fixed by: https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0 (1.26.4)
Support for HTTPS request via HTTPS proxies only introduced in 1.26.0.
In Debian urllib3 does require SSL certificate validation by default (since 1.3-3)
with the 02_require-cert-verification.patch patch (Cf. #686872).

Search for package or bug name: Reporting problems