// For flags

CVE-2015-2296

Mandriva Linux Security Advisory 2015-133

Severity Score

6.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.

La función resolve_redirects en sessions.py en requests 2.1.0 hasta 2.5.3 permite a atacantes remotos realizar ataques de fijación de sesión a través de una cookie sin valor de anfitrión en una redirección.

Python-requests was found to have a vulnerability, where the attacker can retrieve the passwords from ~/.netrc file through redirect requests, if the user has their passwords stored in the ~/.netrc file. It was discovered that the python-requests Proxy-Authorization header was never re-evaluated when a redirect occurs. The Proxy-Authorization header was sent to any new proxy or non-proxy destination as redirected. In python-requests before 2.6.0, a cookie without a host value set would use the hostname for the redirected URL exposing requests users to session fixation attacks and potentially cookie stealing.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-03-14 CVE Reserved
  • 2015-03-16 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mageia Project
Search vendor "Mageia Project"
Mageia
Search vendor "Mageia Project" for product "Mageia"
4.0
Search vendor "Mageia Project" for product "Mageia" and version "4.0"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.1.0
Search vendor "Python" for product "Requests" and version "2.1.0"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.2.1
Search vendor "Python" for product "Requests" and version "2.2.1"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.3.0
Search vendor "Python" for product "Requests" and version "2.3.0"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.4.0
Search vendor "Python" for product "Requests" and version "2.4.0"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.4.1
Search vendor "Python" for product "Requests" and version "2.4.1"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.4.2
Search vendor "Python" for product "Requests" and version "2.4.2"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.4.3
Search vendor "Python" for product "Requests" and version "2.4.3"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.5.0
Search vendor "Python" for product "Requests" and version "2.5.0"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.5.1
Search vendor "Python" for product "Requests" and version "2.5.1"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.5.2
Search vendor "Python" for product "Requests" and version "2.5.2"
-
Affected
Python
Search vendor "Python"
Requests
Search vendor "Python" for product "Requests"
2.5.3
Search vendor "Python" for product "Requests" and version "2.5.3"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.10"
-
Affected