From 04ea4b1e6cb9e05044b0ca821ce28074a1c8472e Mon Sep 17 00:00:00 2001 From: Lumir Balhar Date: Tue, 12 Dec 2023 10:26:43 +0100 Subject: [PATCH] Security fix for CVE-2023-45803 Resolves: RHEL-16874 --- CVE-2023-45803.patch | 94 ++++++++++++++++++++++++++++++++++++++++++++ python-urllib3.spec | 12 +++++- 2 files changed, 105 insertions(+), 1 deletion(-) create mode 100644 CVE-2023-45803.patch diff --git a/CVE-2023-45803.patch b/CVE-2023-45803.patch new file mode 100644 index 0000000..a639836 --- /dev/null +++ b/CVE-2023-45803.patch @@ -0,0 +1,94 @@ +From d71ab28f104cac824c6036fa9b35cc2e2dd19bf8 Mon Sep 17 00:00:00 2001 +From: Lumir Balhar +Date: Tue, 12 Dec 2023 11:06:20 +0100 +Subject: [PATCH] Security fix for CVE-2023-45803 + +--- + src/urllib3/_collections.py | 18 ++++++++++++++++++ + src/urllib3/connectionpool.py | 5 +++++ + src/urllib3/poolmanager.py | 7 +++++-- + 3 files changed, 28 insertions(+), 2 deletions(-) + +diff --git a/src/urllib3/_collections.py b/src/urllib3/_collections.py +index da9857e..bceb845 100644 +--- a/src/urllib3/_collections.py ++++ b/src/urllib3/_collections.py +@@ -268,6 +268,24 @@ class HTTPHeaderDict(MutableMapping): + else: + return vals[1:] + ++ def _prepare_for_method_change(self): ++ """ ++ Remove content-specific header fields before changing the request ++ method to GET or HEAD according to RFC 9110, Section 15.4. ++ """ ++ content_specific_headers = [ ++ "Content-Encoding", ++ "Content-Language", ++ "Content-Location", ++ "Content-Type", ++ "Content-Length", ++ "Digest", ++ "Last-Modified", ++ ] ++ for header in content_specific_headers: ++ self.discard(header) ++ return self ++ + # Backwards compatibility for httplib + getheaders = getlist + getallmatchingheaders = getlist +diff --git a/src/urllib3/connectionpool.py b/src/urllib3/connectionpool.py +index 4018321..8f9ebb5 100644 +--- a/src/urllib3/connectionpool.py ++++ b/src/urllib3/connectionpool.py +@@ -36,6 +36,7 @@ from .exceptions import ( + from .packages import six + from .packages.six.moves import queue + from .packages.ssl_match_hostname import CertificateError ++from ._collections import HTTPHeaderDict + from .request import RequestMethods + from .response import HTTPResponse + from .util.connection import is_connection_dropped +@@ -800,7 +801,11 @@ class HTTPConnectionPool(ConnectionPool, RequestMethods): + redirect_location = redirect and response.get_redirect_location() + if redirect_location: + if response.status == 303: ++ # Change the method according to RFC 9110, Section 15.4.4. + method = "GET" ++ # And lose the body not to transfer anything sensitive. ++ body = None ++ headers = HTTPHeaderDict(headers)._prepare_for_method_change() + + try: + retries = retries.increment(method, url, response=response, _pool=self) +diff --git a/src/urllib3/poolmanager.py b/src/urllib3/poolmanager.py +index 3a31a28..7d4c22c 100644 +--- a/src/urllib3/poolmanager.py ++++ b/src/urllib3/poolmanager.py +@@ -4,7 +4,7 @@ import collections + import functools + import logging + +-from ._collections import RecentlyUsedContainer ++from ._collections import HTTPHeaderDict, RecentlyUsedContainer + from .connectionpool import HTTPConnectionPool, HTTPSConnectionPool, port_by_scheme + from .exceptions import ( + LocationValueError, +@@ -381,9 +381,12 @@ class PoolManager(RequestMethods): + # Support relative URLs for redirecting. + redirect_location = urljoin(url, redirect_location) + +- # RFC 7231, Section 6.4.4 + if response.status == 303: ++ # Change the method according to RFC 9110, Section 15.4.4. + method = "GET" ++ # And lose the body not to transfer anything sensitive. ++ kw["body"] = None ++ kw["headers"] = HTTPHeaderDict(kw["headers"])._prepare_for_method_change() + + retries = kw.get("retries") + if not isinstance(retries, Retry): +-- +2.43.0 + diff --git a/python-urllib3.spec b/python-urllib3.spec index fac5f50..02d25e5 100644 --- a/python-urllib3.spec +++ b/python-urllib3.spec @@ -6,7 +6,7 @@ Name: python-%{srcname} Version: 1.26.5 -Release: 4%{?dist} +Release: 5%{?dist} Summary: Python HTTP library with thread-safe connection pooling and file post License: MIT @@ -26,6 +26,12 @@ BuildArch: noarch # Upstream fix: https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb Patch1: CVE-2023-43804.patch +# CVE-2023-45803 +# Remove HTTP request body when request method is changed. +# Tracking bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-45803 +# Upstream fix: https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 +Patch2: CVE-2023-45803.patch + %description Python HTTP module with connection pooling and file POST abilities. @@ -128,6 +134,10 @@ ln -s %{python3_sitelib}/__pycache__/six.cpython-%{python3_version_nodots}.pyc \ %changelog +* Tue Dec 12 2023 Lumír Balhar - 1.26.5-5 +- Security fix for CVE-2023-45803 +Resolves: RHEL-16874 + * Thu Oct 12 2023 Lumír Balhar - 1.26.5-4 - Security fix for CVE-2023-43804 Resolves: RHEL-12001