Suggested fixes by iCR, OpenRefactory, Inc. #1434
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This issue was detected in branch
master
ofhttpie
project on the version with commit hash810bb1
. This is an instance of a weak cryptography issue.Fixes for weak cryptography issues:
In file:
update_warnings.py
, method:_fetch_updates
, there is code that turns off certificate validation while establishing anSSL/TLS
connection. According to CWE 295, if a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. iCR suggested that the certificate validation option should not be turned off.This issue was detected by OpenRefactory's Intelligent Code Repair (iCR). We are running iCR on libraries in the
PyPI
repository to identify issues and fix them. More info at: pypi.openrefactory.com