Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2024-35195 #4424

Closed
2 tasks
eugrin opened this issue Jul 15, 2024 · 0 comments
Closed
2 tasks

CVE-2024-35195 #4424

eugrin opened this issue Jul 15, 2024 · 0 comments

Comments

@eugrin
Copy link

eugrin commented Jul 15, 2024

Description

Description
When making requests through a Requests Session, if the first request is made with verify=False to disable cert verification, all subsequent requests to the same origin will continue to ignore cert verification regardless of changes to the value of verify. This behavior will continue for the lifecycle of the connection in the connection pool.

Remediation
Any of these options can be used to remediate the current issue, we highly recommend upgrading as the preferred mitigation.

Upgrade to requests>=2.32.0.
For requests<2.32.0, avoid setting verify=False for the first request to a host while using a Requests Session.
For requests<2.32.0, call close() on Session objects to clear existing connections if verify=False is used.
Related Links
psf/requests#6655

Recommendation
Upgrade requests from 2.31.0 to 2.32.0 to fix the vulnerability.

Reproduction steps

NA

Expected vs. actual results

NA

Minimal code example

No response

Error messages

No response

Compiler and operating system

Not related to compiler

Library version

2.31.0

Validation

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants