Update dependency requests to v2.33.0 [SECURITY]#382
Update dependency requests to v2.33.0 [SECURITY]#382renovate[bot] wants to merge 1 commit intodevfrom
Conversation
I've returned from the depths of the test suite with news. 🤿I've aggregated the results of the automated checks for this PR below. 📋 Repo HealthGiving the repo a clean bill of health! 🛁 ✅ All required files present. Latest Version: ✅ 🏷️ Release PreviewEnsuring the 'Contributors' list is sorted and complete. 👥 Current:
🚀 Release Channel Compatibility Predicted next version:
🔒 Security (pip-audit)Looking for any Trojan horses in the dependencies. 🐎 ✅ No known vulnerabilities found (59 packages scanned). 🔍 LintAnother piece of the puzzle! 🧩 ❌ ruff: issues found — see job log 📊 CoverageA deep dive into the sea of test results. 🌊 ✅ 84.9% total coverage Files below 80% coverage (22 files)
Full report: download the 🔨 Build TestsI've poured the digital concrete for this build. 🏗️ ✅ All versions pass
⚖️ License CheckI've checked for any conflicting terms of service. 📜 ✅ No license violations found (40 packages). License distribution: 10× MIT License, 6× MIT, 5× Apache Software License, 5× Apache-2.0, 2× BSD-3-Clause, 2× ISC License (ISCL), 2× PSF-2.0, 2× Python Software Foundation License, +6 more Full breakdown — 40 packages
Copyright (c) 2022 Phil Ewels Permission is hereby granted, free of charge, to any person obtaining a copy The above copyright notice and this permission notice shall be included in all THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR Policy: Apache 2.0 (universal donor). StrongCopyleft / NetworkCopyleft / WeakCopyleft / Other / Error categories fail. MPL allowed. Your friendly neighborhood bot 🕷️ |
cb450b0 to
e61cad0
Compare
e61cad0 to
d17ed84
Compare
This PR contains the following updates:
2.32.5→2.33.0Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function
CVE-2026-25645 / GHSA-gc5v-m9x4-r6x2
More information
Details
Impact
The
requests.utils.extract_zipped_paths()utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one.Affected usages
Standard usage of the Requests library is not affected by this vulnerability. Only applications that call
extract_zipped_paths()directly are impacted.Remediation
Upgrade to at least Requests 2.33.0, where the library now extracts files to a non-deterministic location.
If developers are unable to upgrade, they can set
TMPDIRin their environment to a directory with restricted write access.Severity
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
psf/requests (requests)
v2.33.0Compare Source
Announcements
uses Requests, please take a look at #7271. Give it a try, and report
any gaps or feedback you may have in the issue. 📣
Security
requests.utils.extract_zipped_pathsnow extractscontents to a non-deterministic location to prevent malicious file
replacement. This does not affect default usage of Requests, only
applications calling the utility function directly.
Improvements
Bugfixes
malformed authentication to be applied to Requests on
Python 3.11+. (#7205)
Deprecations
Documentation
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.