Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:python:urllib3:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "0D13162D-373A-4872-B2DC-F7088DB878ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:urllib3:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "FF034AE6-0FE0-45DF-9DC6-E536337CF9D4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low."}, {"lang": "es", "value": "Versiones 1.17 y 1.18 de la librer\u00eda de Python urllib3 sufren una vulnerabilidad que puede provocarles, en ciertas configuraciones, que no validen correctamente certificados TLS. Esto coloca a usuarios de la librer\u00eda con aquellas configuraciones en peligro de ataques man-in-the-middle y de filtraci\u00f3n de informaci\u00f3n. Esta vulnerabilidad afecta a usuarios que utilizan versiones 1.17 y 1.18 de la librer\u00eda urllib3, que est\u00e1n utilizando el soporte PyOpenSSL opcional para TLS en lugar del backend TLS regular de una librer\u00eda est\u00e1ndar, y que est\u00e1n usando OpenSSL 1.1.0 a trav\u00e9s de PyOpenSSL. Esta es una configuraci\u00f3n extremadamente poco com\u00fan, por lo que el impacto de seguridad de esta vulnerabilidad es bajo."}], "id": "CVE-2016-9015", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-01-11T16:59:00.347", "references": [{"source": "cve@mitre.org", "tags": ["Mailing List", "Mitigation"], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/6"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/93941"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Mitigation"], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/93941"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-295"}], "source": "nvd@nist.gov", "type": "Primary"}]}