PYSEC-2021-323

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/products-isurlinportal/PYSEC-2021-323.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2021-323
Aliases
Published
2021-08-02T19:15:00Z
Modified
2023-11-01T04:55:31.312646Z
Summary
[none]
Details

Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like https://example.org is not in the portal. The url https:example.org without slashes is considered to be in the portal. When redirecting, some browsers go to https://example.org, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.

References

Affected packages

PyPI / products-isurlinportal

Package

Name
products-isurlinportal
View open source insights on deps.dev
Purl
pkg:pypi/products-isurlinportal

Affected ranges

Type
GIT
Repo
https://github.com/plone/Products.isurlinportal
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.0

Affected versions

1.*

1.0.0
1.1.0
1.1.1