{ "schema_version": "1.4.0", "id": "GHSA-q3m9-9fj2-mfwr", "modified": "2024-10-21T20:06:22Z", "published": "2021-08-05T17:02:12Z", "aliases": [ "CVE-2021-32806" ], "summary": "URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal", "details": "### Impact\nVarious parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal.\nBut the url `https:example.org` without slashes tricks our code and it _is_ considered to be in the portal.\nWhen redirecting, some browsers go to `https://example.org`, others give an error.\nAttackers may use this to redirect you to their site, especially as part of a phishing attack.\n\n### Patches\nThe problem has been patched in `Products.isurlinportal` 1.2.0.\nThis is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher.\nIt has not been tested on earlier Plone or Python versions.\nUpcoming Plone 5.2.5 and higher will include the new version.\n\n### Discovered\nThis vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you!\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email the Plone Security Team at [security@plone.org](mailto:security@plone.org), especially when you think you have discovered a security problem or when you are not sure.\n* Open an issue in [the tracker](https://github.com/plone/Products.isurlinportal/issues) if your question or comment can be public.\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "Products.isurlinportal" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.2.0" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32806" }, { "type": "WEB", "url": "https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba" }, { "type": "PACKAGE", "url": "https://github.com/plone/Products.isurlinportal" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/products-isurlinportal/PYSEC-2021-323.yaml" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN50804280/index.html" } ], "database_specific": { "cwe_ids": [ "CWE-601" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-08-02T23:19:30Z", "nvd_published_at": "2021-08-02T19:15:00Z" } }