@@ -20,6 +20,62 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/) and this p
20
20
### Fixed
21
21
- Import in ` licensing_manager.py ` .
22
22
- Type of global ` logger ` and ` connect ` variable.
23
+ ### Security
24
+ - Set higher minimum version ` 2.31.0 ` for ` requests ` , as vulnerabilities were found in earlier versions:
25
+ - CVE-2023 -32681, Score: 6.1 (Medium)
26
+ - Requests is a HTTP library. Requests has been leaking Proxy-Authorization headers to destination servers when
27
+ redirected to an HTTPS endpoint. This is a product of how we use ` rebuild_proxies ` to reattach the
28
+ ` Proxy-Authorization ` header to requests. For HTTP connections sent through the tunnel, the proxy will identify
29
+ the header in the request itself and remove it prior to forwarding to the destination server. However when sent
30
+ over HTTPS, the ` Proxy-Authorization ` header must be sent in the CONNECT request as the proxy has no visibility
31
+ into the tunneled request. This results in Requests forwarding proxy credentials to the destination server
32
+ unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue affects
33
+ versions 2.3.0 through 2.30.0.
34
+ - https://devhub.checkmarx.com/cve-details/CVE-2023-32681/
35
+ - Set higher minimum version ` 2.5.1 ` for ` unicorn-binance-rest-api ` are affected by vulnerabilities in used dependencies!
36
+ - Dependency ` certifi ` :
37
+ - CVE-2023 -37920, Score: 9.8 (High)
38
+ - Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while
39
+ verifying the identity of TLS hosts. Certifi 1.0.1 through 2023.5.7 recognizes "e-Tugra" root certificates.
40
+ e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their
41
+ systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
42
+ - https://devhub.checkmarx.com/cve-details/CVE-2023-37920/
43
+ - Dependency ` cryptography ` :
44
+ - CVE-2023 -38325, Score: 7.5 (High)
45
+ - The cryptography package versions prior to 41.0.2 for Python mishandles SSH certificates that have critical
46
+ options.
47
+ - https://devhub.checkmarx.com/cve-details/CVE-2023-38325/
48
+ - CVE-2023 -49083, Score: 7.5 (High)
49
+ - Cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling
50
+ ` load_pem_pkcs7_certificates ` or ` load_der_pkcs7_certificates ` could lead to a NULL-pointer dereference and
51
+ segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application
52
+ attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system
53
+ availability and stability. This issue affects versions 3.1 through 41.0.5.
54
+ - https://devhub.checkmarx.com/cve-details/CVE-2023-49083/
55
+ - CVE-2023 -50782, Score: 7.5 (High)
56
+ - A flaw was found in the python cryptography package versions prior to 42.0.0. This issue may allow a remote
57
+ attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of
58
+ confidential or sensitive data. This issue is an incomplete fix of CVE-2020 -25659.
59
+ - https://devhub.checkmarx.com/cve-details/CVE-2023-50782/
60
+ - CVE-2024 -26130, Score: 7.5 (High)
61
+ - cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Starting
62
+ in version 38.0.0 and prior to version 42.0.4, if ` pkcs12.serialize_key_and_certificates ` is called with both a
63
+ certificate whose public key did not match the provided private key and an ` encryption_algorithm ` with ` hmac_hash `
64
+ set (via ` PrivateFormat.PKCS12.encryption_builder().hmac_hash(...) ` , then a NULL pointer dereference would occur,
65
+ crashing the Python process. This has been resolved in version 42.0.4, the first version in which a ` ValueError `
66
+ is properly raised.
67
+ - https://devhub.checkmarx.com/cve-details/CVE-2024-26130/
68
+ - Dependency ` requests ` :
69
+ - CVE-2023 -32681, Score: 6.1 (Medium)
70
+ - Requests is a HTTP library. Requests has been leaking Proxy-Authorization headers to destination servers when
71
+ redirected to an HTTPS endpoint. This is a product of how we use ` rebuild_proxies ` to reattach the
72
+ ` Proxy-Authorization ` header to requests. For HTTP connections sent through the tunnel, the proxy will identify
73
+ the header in the request itself and remove it prior to forwarding to the destination server. However when sent
74
+ over HTTPS, the ` Proxy-Authorization ` header must be sent in the CONNECT request as the proxy has no visibility
75
+ into the tunneled request. This results in Requests forwarding proxy credentials to the destination server
76
+ unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue affects
77
+ versions 2.3.0 through 2.30.0.
78
+ - https://devhub.checkmarx.com/cve-details/CVE-2023-32681/
23
79
24
80
## 2.7.0
25
81
### Added
0 commit comments