CVE-2019-9636 (CNNVD-201903-311)
中文标题:
Python 信任管理问题漏洞
英文标题:
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encod...
漏洞描述
中文描述:
Python是Python基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。 Python 2.7.x版本版本至2.7.16版本和3.x版本至3.7.2版本中存在信任管理问题漏洞。攻击者可借助特制的URL利用该漏洞泄露信息(cookies或身份验证数据)。
英文描述:
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| python | python | * | - | - |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 28 | - | - |
cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 29 | - | - |
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 30 | - | - |
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 31 | - | - |
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
|
| opensuse | leap | 15.0 | - | - |
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| opensuse | leap | 42.3 | - | - |
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 12.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
|
| canonical | ubuntu_linux | 18.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 19.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
|
| redhat | openshift_container_platform | 3.11 | - | - |
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 8.1 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 8.2 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 8.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 8.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 8.2 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 8.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_eus | 5.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 8.2 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 8.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 8.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | virtualization | 4.0 | - | - |
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
|
| oracle | sun_zfs_storage_appliance_kit | 8.8.6 | - | - |
cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-9636 |
2025-11-11 15:20:17 | 2025-11-11 07:35:54 |
| NVD | nvd_CVE-2019-9636 |
2025-11-11 14:56:20 | 2025-11-11 07:44:22 |
| CNNVD | cnnvd_CNNVD-201903-311 |
2025-11-11 15:10:10 | 2025-11-11 07:54:25 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 信任管理问题
- cnnvd_id: 未提取 -> CNNVD-201903-311
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.8
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 0 -> 36
- data_sources: ['cve'] -> ['cve', 'nvd']