
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-35195 affects the Requests HTTP library prior to version 2.32.0. When making requests through a Requests Session
, if the first request is made with verify=False
to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of verify
. This behavior persists for the lifecycle of the connection in the connection pool (GitHub Advisory).
The vulnerability stems from an incorrect control flow implementation in the connection pool management. When a Session object makes its first request with SSL verification disabled, the connection pool retains this setting for all subsequent requests to the same host, ignoring any changes to the verification settings. The issue has been assigned a CVSS v3.1 base score of 5.6 (Medium) with vector string CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N (GitHub Advisory).
The vulnerability could lead to unintended certificate verification bypass, potentially exposing applications to man-in-the-middle attacks when subsequent requests are expected to verify SSL certificates but don't. This affects the confidentiality and integrity of the data transmitted through these connections (GitHub Advisory).
The vulnerability has been fixed in Requests version 2.32.0. For earlier versions, there are several mitigation options: 1) Upgrade to requests>=2.32.0, 2) Avoid setting verify=False for the first request to a host while using a Requests Session, or 3) Call close() on Session objects to clear existing connections if verify=False is used (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”