Skip to content

Commit 7122673

Browse files
Merge pull request #6650 from github/liiiiiiaduarte34-art-GHSA-9wx4-h78v-vm56
2 parents 689aa67 + c24abe2 commit 7122673

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

advisories/github-reviewed/2024/05/GHSA-9wx4-h78v-vm56/GHSA-9wx4-h78v-vm56.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9wx4-h78v-vm56",
4-
"modified": "2024-06-10T18:31:03Z",
4+
"modified": "2024-06-10T18:31:04Z",
55
"published": "2024-05-20T20:15:00Z",
66
"aliases": [
77
"CVE-2024-35195"
88
],
9-
"summary": "Requests `Session` object does not verify requests after making first request with verify=False",
10-
"details": "When making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same origin will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool.\n\n### Remediation\nAny of these options can be used to remediate the current issue, we highly recommend upgrading as the preferred mitigation.\n\n* Upgrade to `requests>=2.32.0`.\n* For `requests<2.32.0`, avoid setting `verify=False` for the first request to a host while using a Requests Session.\n* For `requests<2.32.0`, call `close()` on `Session` objects to clear existing connections if `verify=False` is used.\n\n### Related Links\n* https://github.com/psf/requests/pull/6655",
9+
"summary": "Requests Session may persist disabled TLS certificate verification across subsequent requests",
10+
"details": "When using a `requests.Session`, if the first request to a given origin is made with `verify=False`, TLS certificate verification may remain disabled for all subsequent requests to that origin, even if `verify=True` is explicitly specified later.\n\nThis occurs because the underlying connection is reused from the session’s connection pool, causing the initial TLS verification setting to persist for the lifetime of the pooled connection. As a result, applications may unintentionally send requests without certificate verification, leading to potential man-in-the-middle attacks and compromised confidentiality or integrity.\n\nThis behavior affects versions of `requests` prior to 2.32.0.\n",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

0 commit comments

Comments
 (0)