FERRAMENTAS LINUX: Critical Security Update: Python-Requests Credential Leak Patch (CVE-2024-47081)

sábado, 5 de julho de 2025

Critical Security Update: Python-Requests Credential Leak Patch (CVE-2024-47081)

 

SUSE


SUSE Linux Micro 6.0 users: Patch CVE-2024-47081 (CVSS 8.2) in python-requests immediately to prevent .netrc credential leaks. Step-by-step fix with zypper commands, CVSS 4.0/3.1 comparisons, and enterprise security implications.

SUSE Linux Micro 6.0 Vulnerability Fix | High CVSS 8.2

Detailed Vulnerability Analysis

CVE-2024-47081 exposes sensitive credentials due to flawed URL parsing in python-requests. Attackers could harvest .netrc credentials remotely (no user interaction required).

Affected Systems

  • SUSE Linux Micro 6.0 (Noarch)

CVSS 4.0/3.1 Scores

SourceScoreVector
SUSE8.2AV:N/AC:L/AT:P/PR:N/UI:N/VC:H
NVD5.3AV:N/AC:H/PR:N/UI:R/S:U/C:H

Why such disparity? SUSE’s scoring reflects broader attack surfaces in enterprise environments.


Patch Instructions

  1. Recommended: Use YaST Online Update or:

    bash
    zypper in -t patch SUSE-SLE-Micro-6.0-371=1
  2. Manual Install:

    bash
    zypper install python311-requests-2.32.3-2.1

⚠️ Delay Risks: Unpatched systems may face credential exfiltration attacks.

Conclusion: Secure Your Systems Now

CVE-2024-47081 poses a serious risk to SUSE Linux Micro 6.0 users, allowing attackers to steal credentials via .netrc files. With a CVSS score of 8.2, this vulnerability demands immediate patching. Follow the provided zypper commands to update python-requests and safeguard your systems.

🔒 Stay proactive—regular updates and vulnerability monitoring are key to maintaining a secure Linux environment. For more critical security patches, bookmark our cybersecurity updates.


Nenhum comentário:

Postar um comentário