Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w832-gg5g-x44m

Опубликовано: 06 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS4: 2.7

Описание

Open redirect endpoint in Datasette

Impact

Deployed instances of Datasette prior to 0.65.2 and 1.0a21 include an open redirect vulnerability.

Hits to the path //example.com/foo/bar/ (the trailing slash is required) will redirect the user to https://example.com/foo/bar.

Patches

This problem has been patched in both Datasette 0.65.2 and 1.0a21.

Workarounds

If Datasette is running behind a proxy that proxy could be configured to replace // with / in incoming request URLs.

Пакеты

Наименование

datasette

pip
Затронутые версииВерсия исправления

< 0.65.2

0.65.2

Наименование

datasette

pip
Затронутые версииВерсия исправления

>= 1.0a0, < 1.0a20

1.0a21

EPSS

Процентиль: 18%
0.00058
Низкий

2.7 Low

CVSS4

Дефекты

CWE-601

Связанные уязвимости

nvd
3 месяца назад

Datasette is an open source multi-tool for exploring and publishing data. In versions 0.65.1 and below and 1.0a0 through 1.0a19, deployed instances of Datasette include an open redirect vulnerability. Hits to the path //example.com/foo/bar/ (the trailing slash is required) will redirect the user to https://example.com/foo/bar. This problem has been patched in both Datasette 0.65.2 and 1.0a21. To workaround this issue, if Datasette is running behind a proxy, that proxy could be configured to replace // with / in incoming request URLs.

EPSS

Процентиль: 18%
0.00058
Низкий

2.7 Low

CVSS4

Дефекты

CWE-601