-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added 'allow_redirects' parameter in perform_request function for RequestsHttpConnection #401
Added 'allow_redirects' parameter in perform_request function for RequestsHttpConnection #401
Conversation
Codecov Report
@@ Coverage Diff @@
## main #401 +/- ##
=======================================
Coverage 72.12% 72.12%
=======================================
Files 77 77
Lines 7190 7190
=======================================
Hits 5186 5186
Misses 2004 2004
|
Thanks @saimedhi for this change. Can you write a simple test on the |
bcc8dfb
to
c318a3e
Compare
PR ready for review |
230ec78
to
edf94e2
Compare
Thanks! Looks like this adds an It also changes the existing behavior, which would be a breaking change for users, isn't it? We should discuss making it. Is that CVE critical enough to warrant a backwards incompatible change?
|
Hello @dblock, Are you recommending that we need to capture 3xx response codes and ensure a new request is made to the redirect destination. This prevents breaking change for users currently relying on redirect behaviors. I agree with your suggestion and will implement it. |
Maybe, but I also think that you can start by turning this PR into just adding Then, as a separate PR, we can discuss the vulnerability and how we can either switch that option to |
If we merge it, it's important that we don't leave the impression that we "fixed" the CVE. That requires a default behavior of no auto-redirect. I'd be okay with 2 merges or 1 big one, but we need to get to the point where we default to the safe code path either way. So we'll need to keep moving toward the catching of the 3xx and the redirect from there. |
edf94e2
to
255e052
Compare
…uestsHttpConnection Signed-off-by: saimedhi <saimedhi@amazon.com>
255e052
to
86d21a2
Compare
Description
Fixed CVE-2023-32681 linked to Requests
Issues Resolved
fixes GHSA-j8r2-6x86-q33q
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.