Skip to content

Upgrade requests to 2.32.4 to fix .netrc credentials leak vulnerability#6

Merged
tmyymmt merged 2 commits intomainfrom
copilot/upgrade-requests-library
Dec 30, 2025
Merged

Upgrade requests to 2.32.4 to fix .netrc credentials leak vulnerability#6
tmyymmt merged 2 commits intomainfrom
copilot/upgrade-requests-library

Conversation

Copy link
Contributor

Copilot AI commented Dec 30, 2025

The requests library prior to 2.32.4 has a URL parsing vulnerability that can leak .netrc credentials to third parties via maliciously-crafted URLs.

Changes

  • Upgraded requests from 2.32.3 to 2.32.4 in requirements.txt and pyproject.toml

References

Original prompt

This section details on the original issue you should resolve

<issue_title>Requests vulnerable to .netrc credentials leak via malicious URLs</issue_title>
<issue_description>> Upgrade requests to fix 1 Dependabot alert in requirements.txt

Upgrade requests to version 2.32.4 or later.

Package Affected versions Patched version
requests (pip) < 2.32.4 2.32.4

Impact
Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.

Workarounds
For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs).

References
psf/requests#6965
https://seclists.org/fulldisclosure/2025/Jun/2

</issue_description>

Comments on the Issue (you are @copilot in this section)


💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.

Co-authored-by: tmyymmt <1584588+tmyymmt@users.noreply.github.com>
Copilot AI changed the title [WIP] Upgrade requests library to fix .netrc credentials leak Upgrade requests to 2.32.4 to fix .netrc credentials leak vulnerability Dec 30, 2025
Copilot AI requested a review from tmyymmt December 30, 2025 02:25
Copy link
Owner

@tmyymmt tmyymmt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@tmyymmt tmyymmt marked this pull request as ready for review December 30, 2025 02:42
Copilot AI review requested due to automatic review settings December 30, 2025 02:42
@tmyymmt tmyymmt merged commit c8f6e85 into main Dec 30, 2025
2 checks passed
@tmyymmt tmyymmt deleted the copilot/upgrade-requests-library branch December 30, 2025 02:42
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR upgrades the requests library from version 2.32.3 to 2.32.4 to address a critical security vulnerability (CVE) where maliciously-crafted URLs could leak .netrc credentials to third parties due to a URL parsing issue.

Key Changes:

  • Updated requests dependency from 2.32.3 to 2.32.4 in both dependency specification files

Reviewed changes

Copilot reviewed 1 out of 2 changed files in this pull request and generated no comments.

File Description
requirements.txt Updated requests version to 2.32.4 to patch the .netrc credentials leak vulnerability
pyproject.toml Updated requests version to 2.32.4 in the project dependencies to maintain consistency with requirements.txt


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Requests vulnerable to .netrc credentials leak via malicious URLs

2 participants

Comments