{"id":"USN-6473-2","summary":"python-pip vulnerabilities","details":"USN-6473-1 fixed vulnerabilities in urllib3. This update provides the\ncorresponding updates for the urllib3 module bundled into pip.\n\nOriginal advisory details:\n\n It was discovered that urllib3 didn't strip HTTP Authorization header\n on cross-origin redirects. A remote attacker could possibly use this \n issue to obtain sensitive information. This issue only affected\n Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091)\n \n It was discovered that urllib3 didn't strip HTTP Cookie header on \n cross-origin redirects. A remote attacker could possibly use this \n issue to obtain sensitive information. (CVE-2023-43804)\n \n It was discovered that urllib3 didn't strip HTTP body on status code\n 303 redirects under certain circumstances. A remote attacker could \n possibly use this issue to obtain sensitive information. (CVE-2023-45803)\n","modified":"2026-04-27T16:39:58.689556Z","published":"2023-11-15T11:27:24Z","related":["UBUNTU-CVE-2018-25091","UBUNTU-CVE-2023-43804","UBUNTU-CVE-2023-45803"],"upstream":["CVE-2018-25091","CVE-2023-43804","CVE-2023-45803","UBUNTU-CVE-2018-25091","UBUNTU-CVE-2023-43804","UBUNTU-CVE-2023-45803"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6473-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25091"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-43804"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45803"}],"affected":[{"package":{"name":"python-pip","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/python-pip@8.1.1-2ubuntu0.6+esm6?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.1.1-2ubuntu0.6+esm6"}]}],"versions":["1.5.6-7ubuntu1","1.5.6-7ubuntu2","8.0.2-7","8.0.3-1","8.0.3-2","8.1.0-1","8.1.0-2","8.1.1-1","8.1.1-2","8.1.1-2ubuntu0.1","8.1.1-2ubuntu0.2","8.1.1-2ubuntu0.4","8.1.1-2ubuntu0.6","8.1.1-2ubuntu0.6+esm2","8.1.1-2ubuntu0.6+esm3","8.1.1-2ubuntu0.6+esm4","8.1.1-2ubuntu0.6+esm5"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"python-pip","binary_version":"8.1.1-2ubuntu0.6+esm6"},{"binary_name":"python-pip-whl","binary_version":"8.1.1-2ubuntu0.6+esm6"},{"binary_name":"python3-pip","binary_version":"8.1.1-2ubuntu0.6+esm6"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-25091"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-43804"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45803"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6473-2.json"}},{"package":{"name":"python-pip","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/python-pip@9.0.1-2.3~ubuntu1.18.04.8+esm2?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.1-2.3~ubuntu1.18.04.8+esm2"}]}],"versions":["9.0.1-2","9.0.1-2.3~ubuntu1","9.0.1-2.3~ubuntu1.18.04.1","9.0.1-2.3~ubuntu1.18.04.2","9.0.1-2.3~ubuntu1.18.04.3","9.0.1-2.3~ubuntu1.18.04.4","9.0.1-2.3~ubuntu1.18.04.5","9.0.1-2.3~ubuntu1.18.04.5+esm2","9.0.1-2.3~ubuntu1.18.04.5+esm3","9.0.1-2.3~ubuntu1.18.04.6","9.0.1-2.3~ubuntu1.18.04.6+esm1","9.0.1-2.3~ubuntu1.18.04.7","9.0.1-2.3~ubuntu1.18.04.7+esm1","9.0.1-2.3~ubuntu1.18.04.8","9.0.1-2.3~ubuntu1.18.04.8+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"python-pip","binary_version":"9.0.1-2.3~ubuntu1.18.04.8+esm2"},{"binary_name":"python-pip-whl","binary_version":"9.0.1-2.3~ubuntu1.18.04.8+esm2"},{"binary_name":"python3-pip","binary_version":"9.0.1-2.3~ubuntu1.18.04.8+esm2"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-25091"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-43804"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45803"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6473-2.json"}},{"package":{"name":"python-pip","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/python-pip@20.0.2-5ubuntu1.10?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20.0.2-5ubuntu1.10"}]}],"versions":["18.1-5","18.1-5build1","18.1-5ubuntu1","20.0.2-2","20.0.2-4","20.0.2-5","20.0.2-5ubuntu1","20.0.2-5ubuntu1.1","20.0.2-5ubuntu1.3","20.0.2-5ubuntu1.4","20.0.2-5ubuntu1.5","20.0.2-5ubuntu1.6","20.0.2-5ubuntu1.7","20.0.2-5ubuntu1.8","20.0.2-5ubuntu1.9"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"python-pip-whl","binary_version":"20.0.2-5ubuntu1.10"},{"binary_name":"python3-pip","binary_version":"20.0.2-5ubuntu1.10"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-43804"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45803"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6473-2.json"}},{"package":{"name":"python-pip","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/python-pip@22.0.2+dfsg-1ubuntu0.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"22.0.2+dfsg-1ubuntu0.4"}]}],"versions":["20.3.4-4","21.3.1+dfsg-3","22.0.2+dfsg-1","22.0.2+dfsg-1ubuntu0.1","22.0.2+dfsg-1ubuntu0.2","22.0.2+dfsg-1ubuntu0.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"python3-pip","binary_version":"22.0.2+dfsg-1ubuntu0.4"},{"binary_name":"python3-pip-whl","binary_version":"22.0.2+dfsg-1ubuntu0.4"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-43804"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45803"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6473-2.json"}}],"schema_version":"1.7.5"}