Update dependency requests to v2.33.0 [SECURITY]#364
Update dependency requests to v2.33.0 [SECURITY]#364renovate[bot] wants to merge 1 commit intodevfrom
Conversation
The automated inspectors have returned with their findings. 🕵️♂️I've aggregated the results of the automated checks for this PR below. 📋 Repo HealthIs the codebase feeling fit today? Let's check. 🏃♂️ ✅ All required files present. Latest Version: ✅ 🔒 Security (pip-audit)Looking for any Trojan horses in the dependencies. 🐎 ✅ No known vulnerabilities found (45 packages scanned). 🔍 LintI've finished the heavy lifting on this check. 🏋️♂️ ❌ ruff: issues found — see job log 📊 CoverageA comprehensive review of our code coverage. 📖 🏷️ Release PreviewA look ahead at the next milestone. 🚩 Current:
🚀 Release Channel Compatibility Predicted next version:
🔨 Build TestsBuild test complete! Let's see if everything fits together. 🧩 ✅ All versions pass
⚖️ License CheckEnsuring we're respecting the rights of others. 🤝 ✅ No license violations found (27 packages). License distribution: 8× MIT License, 5× MIT, 2× Apache Software License, 2× Apache-2.0, 2× BSD-3-Clause, 2× ISC License (ISCL), 1× Apache Software License; BSD License, 1× Apache-2.0 OR BSD-2-Clause, +4 more Full breakdown — 27 packages
Copyright (c) 2022 Phil Ewels Permission is hereby granted, free of charge, to any person obtaining a copy The above copyright notice and this permission notice shall be included in all THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR Policy: Apache 2.0 (universal donor). StrongCopyleft / NetworkCopyleft / WeakCopyleft / Other / Error categories fail. MPL allowed. Your automated guardian for repository health 🛡️ |
fbf86ed to
0f3adaa
Compare
This PR contains the following updates:
2.32.5→2.33.0Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function
CVE-2026-25645 / GHSA-gc5v-m9x4-r6x2
More information
Details
Impact
The
requests.utils.extract_zipped_paths()utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one.Affected usages
Standard usage of the Requests library is not affected by this vulnerability. Only applications that call
extract_zipped_paths()directly are impacted.Remediation
Upgrade to at least Requests 2.33.0, where the library now extracts files to a non-deterministic location.
If developers are unable to upgrade, they can set
TMPDIRin their environment to a directory with restricted write access.Severity
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
psf/requests (requests)
v2.33.0Compare Source
Announcements
uses Requests, please take a look at #7271. Give it a try, and report
any gaps or feedback you may have in the issue. 📣
Security
requests.utils.extract_zipped_pathsnow extractscontents to a non-deterministic location to prevent malicious file
replacement. This does not affect default usage of Requests, only
applications calling the utility function directly.
Improvements
Bugfixes
malformed authentication to be applied to Requests on
Python 3.11+. (#7205)
Deprecations
Documentation
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.