urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "python-pip",
"binary_version": "8.1.1-2ubuntu0.6+esm6"
},
{
"binary_name": "python-pip-whl",
"binary_version": "8.1.1-2ubuntu0.6+esm6"
},
{
"binary_name": "python3-pip",
"binary_version": "8.1.1-2ubuntu0.6+esm6"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "python-pip",
"binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2"
},
{
"binary_name": "python-pip-whl",
"binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2"
},
{
"binary_name": "python3-pip",
"binary_version": "9.0.1-2.3~ubuntu1.18.04.8+esm2"
}
]
}