urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-pip", "binary_version": "8.1.1-2ubuntu0.6+esm6" }, { "binary_name": "python-pip-whl", "binary_version": "8.1.1-2ubuntu0.6+esm6" }, { "binary_name": "python3-pip", "binary_version": "8.1.1-2ubuntu0.6+esm6" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-pip", "binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2" }, { "binary_name": "python-pip-whl", "binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2" }, { "binary_name": "python3-pip", "binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2" } ] }