CVE-2021-28363 vulnerability in Python and Other Products
Published on March 15, 2021
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.
Products Associated with CVE-2021-28363
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-28363 are published in these products:
Vulnerable Packages
The following package name and versions may be associated with CVE-2021-28363
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| pip | urllib3 | >= 1.26.0, <= 1.26.3 | 1.26.4 |
Exploit Probability
EPSS
0.11%
Percentile
28.92%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.