CVE-2024-35195
Python vulnerability analysis and mitigation

Overview

CVE-2024-35195 affects the Requests HTTP library prior to version 2.32.0. When making requests through a Requests Session, if the first request is made with verify=False to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of verify. This behavior persists for the lifecycle of the connection in the connection pool (GitHub Advisory).

Technical details

The vulnerability stems from an incorrect control flow implementation in the connection pool management. When a Session object makes its first request with SSL verification disabled, the connection pool retains this setting for all subsequent requests to the same host, ignoring any changes to the verification settings. The issue has been assigned a CVSS v3.1 base score of 5.6 (Medium) with vector string CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N (GitHub Advisory).

Impact

The vulnerability could lead to unintended certificate verification bypass, potentially exposing applications to man-in-the-middle attacks when subsequent requests are expected to verify SSL certificates but don't. This affects the confidentiality and integrity of the data transmitted through these connections (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Requests version 2.32.0. For earlier versions, there are several mitigation options: 1) Upgrade to requests>=2.32.0, 2) Avoid setting verify=False for the first request to a host while using a Requests Session, or 3) Call close() on Session objects to clear existing connections if verify=False is used (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management