POC详情: c08db123b150a6e255abfd89b57a06d488cb84a7

来源
关联漏洞
标题: urllib3 信息泄露漏洞 (CVE-2023-43804)
描述:urllib3是一款Python HTTP库。该产品具有线程安全连接池、文件发布支持等。 urllib3存在信息泄露漏洞,该漏洞源于在跨源重定向期间不会剥离Cookie请求标头,导致HTTP重定向将信息泄漏到其他源。受影响的产品和版本:urllib3 2至2.0.5版本,1.26.16及之前版本。
描述
Example of how CVE-2023-43804 works with real python code.
介绍
# PoC
Example of how CVE-2023-43804 works with real python code.


Explaining `CVE-2023-43804/server.py` and `CVE-2023-43804/example.py`

In `server.py` I created a simple website that redirects you to google.com, so make sure to run `server.py` first before trying `example.py`.

In `example.py` I added a cookie to the request header, so when you try to request `http://127.0.0.1:5000/` (it's a local website we created via `python server.py`) you will be redirected to google.com, after that when reading `Cookies` you will find that your cookies been redirected too to be with your cookies on google.com.


This bug is fixed on URLLIB3 2.0.6, having any older version may expose to attackers.

# Support
If you would like to support me with donation, I recommend you to give it to someone who really need it please. If you do so then consider that i earned your support.

<a href="https://www.buymeacoffee.com/jawadpy" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-green.png" alt="Buy Me A Coffee" style="height: 60px !important;width: 217px !important;" ></a>
文件快照

[4.0K] /data/pocs/c08db123b150a6e255abfd89b57a06d488cb84a7 ├── [4.0K] CVE-2023-43804 │   ├── [ 605] example.py │   └── [ 232] server.py └── [1.1K] README.md 1 directory, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。