CVE Vulnerabilities

CVE-2024-35195

Always-Incorrect Control Flow Implementation

Published: May 20, 2024 | Modified: Jun 10, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.6 MODERATE
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests Session, if the first request is made with verify=False to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of verify. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.

Weakness

The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.

Affected Software

Name Vendor Start Version End Version
Red Hat Ansible Automation Platform 2.4 for RHEL 8 RedHat python3x-requests-0:2.32.2-1.el8ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 8 RedHat automation-controller-0:4.5.8-1.el8ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 9 RedHat python-requests-0:2.32.2-1.el9ap *
Red Hat Ansible Automation Platform 2.4 for RHEL 9 RedHat automation-controller-0:4.5.8-1.el9ap *
Python-pip Ubuntu devel *
Python-pip Ubuntu esm-apps/bionic *
Python-pip Ubuntu esm-apps/focal *
Python-pip Ubuntu esm-apps/jammy *
Python-pip Ubuntu esm-apps/noble *
Python-pip Ubuntu esm-apps/xenial *
Python-pip Ubuntu esm-infra-legacy/trusty *
Python-pip Ubuntu focal *
Python-pip Ubuntu jammy *
Python-pip Ubuntu mantic *
Python-pip Ubuntu noble *
Python-pip Ubuntu oracular *
Python-pip Ubuntu trusty/esm *
Requests Ubuntu devel *
Requests Ubuntu esm-infra-legacy/trusty *
Requests Ubuntu esm-infra/bionic *
Requests Ubuntu esm-infra/xenial *
Requests Ubuntu focal *
Requests Ubuntu jammy *
Requests Ubuntu mantic *
Requests Ubuntu noble *
Requests Ubuntu oracular *
Requests Ubuntu trusty/esm *

References