MGASA-2024-0308

Source
https://advisories.mageia.org/MGASA-2024-0308.html
Import Source
https://advisories.mageia.org/MGASA-2024-0308.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0308
Related
Published
2024-09-17T02:41:21Z
Modified
2024-09-17T02:18:51Z
Summary
Updated python3-webob package fix security vulnerability
Details

When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. urlparse however treats a // at the start of a string as a URI without a scheme, and then treats the next part as the hostname. urljoin will then use that hostname from the second part as the hostname replacing the original one from the request.

References
Credits

Affected packages

Mageia:9 / python-webob

Package

Name
python-webob
Purl
pkg:rpm/mageia/python-webob?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.8-1.mga9

Ecosystem specific

{
    "section": "core"
}