Debian 10264 Published by

A requests security update has been released for Debian GNU/Linux 10 LTS to address an issue that allowing a malicious actor to potentially ex filtrate sensitive information.



[SECURITY] [DLA 3456-1] requests security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3456-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Markus Koschany
June 18, 2023 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : requests
Version : 2.21.0-1+deb10u1
CVE ID : CVE-2023-32681
Debian Bug : 1036693

Requests, a Python HTTP library, has been leaking Proxy-Authorization headers
to destination servers when redirected to an HTTPS endpoint. For HTTP
connections sent through the tunnel, the proxy will identify the header in the
request itself and remove it prior to forwarding to the destination server.
However when sent over HTTPS, the `Proxy-Authorization` header must be sent in
the CONNECT request as the proxy has no visibility into the tunneled request.
This results in Requests forwarding proxy credentials to the destination
server unintentionally, allowing a malicious actor to potentially exfiltrate
sensitive information.

For Debian 10 buster, this problem has been fixed in version
2.21.0-1+deb10u1.

We recommend that you upgrade your requests packages.

For the detailed security status of requests please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/requests

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS