ghsa-q3m9-9fj2-mfwr
Vulnerability from github
7.1 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Impact
Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like https://example.org
is not in the portal.
But the url https:example.org
without slashes tricks our code and it is considered to be in the portal.
When redirecting, some browsers go to https://example.org
, others give an error.
Attackers may use this to redirect you to their site, especially as part of a phishing attack.
Patches
The problem has been patched in Products.isurlinportal
1.2.0.
This is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher.
It has not been tested on earlier Plone or Python versions.
Upcoming Plone 5.2.5 and higher will include the new version.
Discovered
This vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you!
For more information
If you have any questions or comments about this advisory: * Email the Plone Security Team at security@plone.org, especially when you think you have discovered a security problem or when you are not sure. * Open an issue in the tracker if your question or comment can be public.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "Products.isurlinportal" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.2.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-32806" ], "database_specific": { "cwe_ids": [ "CWE-601" ], "github_reviewed": true, "github_reviewed_at": "2021-08-02T23:19:30Z", "nvd_published_at": "2021-08-02T19:15:00Z", "severity": "HIGH" }, "details": "### Impact\nVarious parts of Plone use the \u0027is url in portal\u0027 check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal.\nBut the url `https:example.org` without slashes tricks our code and it _is_ considered to be in the portal.\nWhen redirecting, some browsers go to `https://example.org`, others give an error.\nAttackers may use this to redirect you to their site, especially as part of a phishing attack.\n\n### Patches\nThe problem has been patched in `Products.isurlinportal` 1.2.0.\nThis is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher.\nIt has not been tested on earlier Plone or Python versions.\nUpcoming Plone 5.2.5 and higher will include the new version.\n\n### Discovered\nThis vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you!\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email the Plone Security Team at [security@plone.org](mailto:security@plone.org), especially when you think you have discovered a security problem or when you are not sure.\n* Open an issue in [the tracker](https://github.com/plone/Products.isurlinportal/issues) if your question or comment can be public.\n", "id": "GHSA-q3m9-9fj2-mfwr", "modified": "2024-10-21T20:06:22Z", "published": "2021-08-05T17:02:12Z", "references": [ { "type": "WEB", "url": "https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32806" }, { "type": "WEB", "url": "https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba" }, { "type": "PACKAGE", "url": "https://github.com/plone/Products.isurlinportal" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/products-isurlinportal/PYSEC-2021-323.yaml" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN50804280/index.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) in Products.isurlinportal" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.