Improper Certificate Validation in urllib3 - CVE-2019-11324
Published: October 15, 2019 / Updated: June 20, 2021
Vulnerability identifier: #VU21780
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2019-11324
CWE-ID: CWE-295
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vendor: urlib3
Affected software:
urllib3
urllib3
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the urllib3 library for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates. A remote attacker can cause the certificates to be considered trusted contrary to expectations. This is related to use of the "ssl_context", "ca_certs" or "ca_certs_dir" argument.
How to mitigate CVE-2019-11324
Install updates from vendor's website.