Skip to content

Conversation

@github-actions
Copy link

@github-actions github-actions bot commented Jun 16, 2025

Fixed dependency issues for Python 3.10

Name Version ID Fix Versions Description
requests 2.32.3 GHSA-9hjg-9r4m-mvj7 2.32.4 ### Impact Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. ### Workarounds For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs). ### References psf/requests#6965 https://seclists.org/fulldisclosure/2025/Jun/2
urllib3 2.3.0 GHSA-48p4-8xcf-vxj5 2.5.0 urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means you can use Python libraries to make HTTP requests from your browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects. However, the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. ## Affected usages Any code which relies on urllib3 to control the number of redirects for an HTTP request in a Pyodide runtime. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects may remain vulnerable if a Pyodide runtime redirect mechanism is unsuitable. ## Remediation If you use urllib3 in Node.js, upgrade to a patched version of urllib3. Unfortunately, browsers provide no suitable way which urllib3 can use: XMLHttpRequest provides no control over redirects, the Fetch API returns opaqueredirect responses lacking data when redirects are controlled manually. Expect default browser behavior for redirects.
urllib3 2.3.0 GHSA-pq67-6m6q-mj2v 2.5.0 urllib3 handles redirects and retries using the same mechanism, which is controlled by the Retry object. The most common way to disable redirects is at the request level, as follows: python resp = urllib3.request("GET", "https://httpbin.org/redirect/1", redirect=False) print(resp.status) # 302 However, it is also possible to disable redirects, for all requests, by instantiating a PoolManager and specifying retries in a way that disable redirects: python import urllib3 http = urllib3.PoolManager(retries=0) # should raise MaxRetryError on redirect http = urllib3.PoolManager(retries=urllib3.Retry(redirect=0)) # equivalent to the above http = urllib3.PoolManager(retries=False) # should return the first response resp = http.request("GET", "https://httpbin.org/redirect/1") However, the retries parameter is currently ignored, which means all the above examples don't disable redirects. ## Affected usages Passing retries on PoolManager instantiation to disable redirects or restrict their number. By default, requests and botocore users are not affected. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. ## Remediation You can remediate this vulnerability with the following steps: * Upgrade to a patched version of urllib3. If your organization would benefit from the continued support of urllib3 1.x, please contact [email protected] to discuss sponsorship or contribution opportunities. * Disable redirects at the request() level instead of the PoolManager() level.
Name Skip Reason
py-tes URL requirements cannot be pinned to a specific package version

Fixed dependency issues for Python 3.11

Name Version ID Fix Versions Description
requests 2.32.3 GHSA-9hjg-9r4m-mvj7 2.32.4 ### Impact Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. ### Workarounds For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs). ### References psf/requests#6965 https://seclists.org/fulldisclosure/2025/Jun/2
urllib3 2.3.0 GHSA-48p4-8xcf-vxj5 2.5.0 urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means you can use Python libraries to make HTTP requests from your browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects. However, the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. ## Affected usages Any code which relies on urllib3 to control the number of redirects for an HTTP request in a Pyodide runtime. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects may remain vulnerable if a Pyodide runtime redirect mechanism is unsuitable. ## Remediation If you use urllib3 in Node.js, upgrade to a patched version of urllib3. Unfortunately, browsers provide no suitable way which urllib3 can use: XMLHttpRequest provides no control over redirects, the Fetch API returns opaqueredirect responses lacking data when redirects are controlled manually. Expect default browser behavior for redirects.
urllib3 2.3.0 GHSA-pq67-6m6q-mj2v 2.5.0 urllib3 handles redirects and retries using the same mechanism, which is controlled by the Retry object. The most common way to disable redirects is at the request level, as follows: python resp = urllib3.request("GET", "https://httpbin.org/redirect/1", redirect=False) print(resp.status) # 302 However, it is also possible to disable redirects, for all requests, by instantiating a PoolManager and specifying retries in a way that disable redirects: python import urllib3 http = urllib3.PoolManager(retries=0) # should raise MaxRetryError on redirect http = urllib3.PoolManager(retries=urllib3.Retry(redirect=0)) # equivalent to the above http = urllib3.PoolManager(retries=False) # should return the first response resp = http.request("GET", "https://httpbin.org/redirect/1") However, the retries parameter is currently ignored, which means all the above examples don't disable redirects. ## Affected usages Passing retries on PoolManager instantiation to disable redirects or restrict their number. By default, requests and botocore users are not affected. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. ## Remediation You can remediate this vulnerability with the following steps: * Upgrade to a patched version of urllib3. If your organization would benefit from the continued support of urllib3 1.x, please contact [email protected] to discuss sponsorship or contribution opportunities. * Disable redirects at the request() level instead of the PoolManager() level.
Name Skip Reason
py-tes URL requirements cannot be pinned to a specific package version

Fixed dependency issues for Python 3.12

Name Version ID Fix Versions Description
requests 2.32.3 GHSA-9hjg-9r4m-mvj7 2.32.4 ### Impact Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. ### Workarounds For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs). ### References psf/requests#6965 https://seclists.org/fulldisclosure/2025/Jun/2
urllib3 2.3.0 GHSA-48p4-8xcf-vxj5 2.5.0 urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means you can use Python libraries to make HTTP requests from your browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects. However, the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. ## Affected usages Any code which relies on urllib3 to control the number of redirects for an HTTP request in a Pyodide runtime. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects may remain vulnerable if a Pyodide runtime redirect mechanism is unsuitable. ## Remediation If you use urllib3 in Node.js, upgrade to a patched version of urllib3. Unfortunately, browsers provide no suitable way which urllib3 can use: XMLHttpRequest provides no control over redirects, the Fetch API returns opaqueredirect responses lacking data when redirects are controlled manually. Expect default browser behavior for redirects.
urllib3 2.3.0 GHSA-pq67-6m6q-mj2v 2.5.0 urllib3 handles redirects and retries using the same mechanism, which is controlled by the Retry object. The most common way to disable redirects is at the request level, as follows: python resp = urllib3.request("GET", "https://httpbin.org/redirect/1", redirect=False) print(resp.status) # 302 However, it is also possible to disable redirects, for all requests, by instantiating a PoolManager and specifying retries in a way that disable redirects: python import urllib3 http = urllib3.PoolManager(retries=0) # should raise MaxRetryError on redirect http = urllib3.PoolManager(retries=urllib3.Retry(redirect=0)) # equivalent to the above http = urllib3.PoolManager(retries=False) # should return the first response resp = http.request("GET", "https://httpbin.org/redirect/1") However, the retries parameter is currently ignored, which means all the above examples don't disable redirects. ## Affected usages Passing retries on PoolManager instantiation to disable redirects or restrict their number. By default, requests and botocore users are not affected. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. ## Remediation You can remediate this vulnerability with the following steps: * Upgrade to a patched version of urllib3. If your organization would benefit from the continued support of urllib3 1.x, please contact [email protected] to discuss sponsorship or contribution opportunities. * Disable redirects at the request() level instead of the PoolManager() level.
Name Skip Reason
py-tes URL requirements cannot be pinned to a specific package version

Fixed dependency issues for Python 3.13

Name Version ID Fix Versions Description
requests 2.32.3 GHSA-9hjg-9r4m-mvj7 2.32.4 ### Impact Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. ### Workarounds For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs). ### References psf/requests#6965 https://seclists.org/fulldisclosure/2025/Jun/2
urllib3 2.3.0 GHSA-48p4-8xcf-vxj5 2.5.0 urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means you can use Python libraries to make HTTP requests from your browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects. However, the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. ## Affected usages Any code which relies on urllib3 to control the number of redirects for an HTTP request in a Pyodide runtime. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects may remain vulnerable if a Pyodide runtime redirect mechanism is unsuitable. ## Remediation If you use urllib3 in Node.js, upgrade to a patched version of urllib3. Unfortunately, browsers provide no suitable way which urllib3 can use: XMLHttpRequest provides no control over redirects, the Fetch API returns opaqueredirect responses lacking data when redirects are controlled manually. Expect default browser behavior for redirects.
urllib3 2.3.0 GHSA-pq67-6m6q-mj2v 2.5.0 urllib3 handles redirects and retries using the same mechanism, which is controlled by the Retry object. The most common way to disable redirects is at the request level, as follows: python resp = urllib3.request("GET", "https://httpbin.org/redirect/1", redirect=False) print(resp.status) # 302 However, it is also possible to disable redirects, for all requests, by instantiating a PoolManager and specifying retries in a way that disable redirects: python import urllib3 http = urllib3.PoolManager(retries=0) # should raise MaxRetryError on redirect http = urllib3.PoolManager(retries=urllib3.Retry(redirect=0)) # equivalent to the above http = urllib3.PoolManager(retries=False) # should return the first response resp = http.request("GET", "https://httpbin.org/redirect/1") However, the retries parameter is currently ignored, which means all the above examples don't disable redirects. ## Affected usages Passing retries on PoolManager instantiation to disable redirects or restrict their number. By default, requests and botocore users are not affected. ## Impact Redirects are often used to exploit SSRF vulnerabilities. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. ## Remediation You can remediate this vulnerability with the following steps: * Upgrade to a patched version of urllib3. If your organization would benefit from the continued support of urllib3 1.x, please contact [email protected] to discuss sponsorship or contribution opportunities. * Disable redirects at the request() level instead of the PoolManager() level.
Name Skip Reason
py-tes URL requirements cannot be pinned to a specific package version

@github-actions github-actions bot force-pushed the create-pull-request/patch-audit-constraints branch from 9b6760b to dc66489 Compare June 23, 2025 12:11
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-06-16T12:11:53+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-06-23T12:11:35+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jun 23, 2025
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-06-23T12:11:35+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-06-30T12:11:15+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jun 30, 2025
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-06-30T12:11:15+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-07-07T12:11:12+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jul 7, 2025
@github-actions github-actions bot force-pushed the create-pull-request/patch-audit-constraints branch from dc66489 to b5ae3b4 Compare July 14, 2025 12:11
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-07-07T12:11:12+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-07-14T12:11:34+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jul 14, 2025
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-07-14T12:11:34+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-07-21T12:12:08+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jul 21, 2025
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-07-21T12:12:08+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-07-28T12:12:16+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jul 28, 2025
@github-actions github-actions bot changed the title Updated constraints due security reasons (triggered on 2025-07-28T12:12:16+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Updated constraints due security reasons (triggered on 2025-07-28T14:22:31+00:00 by 640c085fbebcefd6e56d7bef91831c5ece20101f) Jul 28, 2025
@jmfernandez jmfernandez merged commit 20568a5 into main Jul 28, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants