Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEzbTktOWZqMi1tZndy

URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal

Impact

Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like https://example.org is not in the portal.
But the url https:example.org without slashes tricks our code and it is considered to be in the portal.
When redirecting, some browsers go to https://example.org, others give an error.
Attackers may use this to redirect you to their site, especially as part of a phishing attack.

Patches

The problem has been patched in Products.isurlinportal 1.2.0.
This is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher.
It has not been tested on earlier Plone or Python versions.
Upcoming Plone 5.2.5 and higher will include the new version.

Discovered

This vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you!

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-q3m9-9fj2-mfwr
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEzbTktOWZqMi1tZndy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Identifiers: GHSA-q3m9-9fj2-mfwr, CVE-2021-32806
References: Repository: https://github.com/plone/Products.isurlinportal
Blast Radius: 0.0

Affected Packages

pypi:Products.isurlinportal
Dependent packages: 1
Dependent repositories: 1
Downloads: 9,857 last month
Affected Version Ranges: < 1.2.0
Fixed in: 1.2.0
All affected versions: 1.0.0, 1.1.0, 1.1.1
All unaffected versions: 1.2.0, 1.2.1, 2.0.0, 2.0.1, 2.0.2