CVE-2021-32806

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-32806
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32806.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-32806
Aliases
Related
Published
2021-08-02T19:15:08Z
Modified
2025-07-01T12:31:50.443270Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like https://example.org is not in the portal. The url https:example.org without slashes is considered to be in the portal. When redirecting, some browsers go to https://example.org, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.

References

Affected packages

Git / github.com/plone/products.isurlinportal

Affected ranges

Type
GIT
Repo
https://github.com/plone/products.isurlinportal
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.1.0
1.1.1