{"id":"CVE-2015-2296","details":"The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.","aliases":["GHSA-pg2w-x9wp-vw92","PYSEC-2015-17"],"modified":"2026-01-27T04:13:53.335180Z","published":"2015-03-18T16:59:03Z","withdrawn":"2026-01-27T04:13:53.335180Z","related":["MGASA-2015-0120","SUSE-FU-2021:2130-1","SUSE-FU-2022:0444-1","SUSE-FU-2022:0445-1","SUSE-RU-2019:2505-1","SUSE-SU-2015:2156-1","SUSE-SU-2016:0114-1","SUSE-SU-2020:1792-1","openSUSE-SU-2024:10098-1","openSUSE-SU-2024:10125-1","openSUSE-SU-2024:11251-1","openSUSE-SU-2024:11266-1","openSUSE-SU-2024:11281-1","openSUSE-SU-2024:13916-1","openSUSE-SU-2024:13999-1"],"references":[{"type":"ADVISORY","url":"http://advisories.mageia.org/MGASA-2015-0120.html"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:133"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2531-1"},{"type":"ADVISORY","url":"https://warehouse.python.org/project/requests/2.6.0/"},{"type":"FIX","url":"https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153594.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/03/14/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/03/15/1"}],"schema_version":"1.7.3"}