Description Preview
The vulnerability in the `requests` library prior to version 2.32.0 arises when using a `Session` object to make requests with `verify=False`, which disables certificate verification. Subsequent requests to the same host will continue to ignore certificate verification, regardless of any changes to the `verify` value. This behavior persists for the lifecycle of the connection in the connection pool, potentially leading to security risks related to confidentiality and integrity.
Overview
- CVE ID: CVE-2024-35195
- CWE ID: CWE-670 (Always-Incorrect Control Flow Implementation)
- CVSS Score: 5.6 (Medium severity)
- Attack Vector: LOCAL
- Attack Complexity: HIGH
- Privileges Required: HIGH
- User Interaction: REQUIRED
- Scope: UNCHANGED
- Confidentiality Impact: HIGH
- Integrity Impact: HIGH
- Availability Impact: NONE
Remediation
To address this vulnerability, users of the requests
library should upgrade to version 2.32.0 or later. In version 2.32.0, the issue related to certificate verification behavior in Session
objects has been fixed, ensuring that subsequent requests correctly verify certificates based on the verify
setting.
References
- GitHub Security Advisory: GHSA-9wx4-h78v-vm56
- Pull Request for Fix: GitHub Pull Request #6655
- Commit with Fix: GitHub Commit a58d7f2ffb4d00b46dca2d70a3932a0b37e22fac
- Fedora Project Announcement 1: Link 1
- Fedora Project Announcement 2: Link 2
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Health Care & Social AssistanceHealth Care & Social Assistance
- Finance and InsuranceFinance and Insurance
- Transportation & WarehousingTransportation & Warehousing
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Educational ServicesEducational Services
- Retail TradeRetail Trade
- Other Services (except Public Administration)Other Services (except Public Administration)
- UtilitiesUtilities
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- MiningMining
- Wholesale TradeWholesale Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- Real Estate Rental & LeasingReal Estate Rental & Leasing