{"id":"PYSEC-2023-207","details":"urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).","aliases":["CVE-2018-25091","GHSA-gwvm-45gx-3cf8"],"modified":"2026-03-11T07:47:05.360355Z","published":"2023-10-15T19:15:00Z","references":[{"type":"FIX","url":"https://github.com/urllib3/urllib3/compare/1.24.1...1.24.2"},{"type":"REPORT","url":"https://github.com/urllib3/urllib3/issues/1510"},{"type":"FIX","url":"https://github.com/urllib3/urllib3/issues/1510"},{"type":"ADVISORY","url":"https://github.com/urllib3/urllib3/issues/1510"},{"type":"FIX","url":"https://github.com/urllib3/urllib3/commit/adb358f8e06865406d1f05e581a16cbea2136fbc"}],"affected":[{"package":{"name":"urllib3","ecosystem":"PyPI","purl":"pkg:pypi/urllib3"},"ranges":[{"type":"GIT","repo":"https://github.com/urllib3/urllib3","events":[{"introduced":"0"},{"fixed":"adb358f8e06865406d1f05e581a16cbea2136fbc"}]},{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.24.2"}]}],"versions":["0.2","0.3","0.3.1","0.4.0","0.4.1","1.0","1.0.1","1.0.2","1.1","1.10","1.10.1","1.10.2","1.10.3","1.10.4","1.11","1.12","1.13","1.13.1","1.14","1.15","1.15.1","1.16","1.17","1.18","1.18.1","1.19","1.19.1","1.2","1.2.1","1.2.2","1.20","1.21","1.21.1","1.22","1.23","1.24","1.24.1","1.3","1.4","1.5","1.6","1.7","1.7.1","1.8","1.8.2","1.8.3","1.9","1.9.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/urllib3/PYSEC-2023-207.yaml"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}