Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3610-1 | python-urllib3 security update |
Debian DLA |
DLA-3998-1 | python-urllib3 security update |
EUVD |
EUVD-2023-0252 | urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. |
Github GHSA |
GHSA-v845-jxx5-vc9f | `Cookie` HTTP header isn't stripped on cross-origin redirects |
Ubuntu USN |
USN-6473-1 | urllib3 vulnerabilities |
Ubuntu USN |
USN-6473-2 | pip vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T21:49:44.074Z
Reserved: 2023-09-22T14:51:42.340Z
Link: CVE-2023-43804
No data.
Status : Modified
Published: 2023-10-04T17:15:10.163
Modified: 2025-11-03T22:16:27.767
Link: CVE-2023-43804
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN