Логотип exploitDog
bind:"BDU:2024-07761" OR bind:"CVE-2024-42353"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-07761" OR bind:"CVE-2024-42353"

Количество 11

Количество 11

fstec логотип

BDU:2024-07761

11 месяцев назад

Уязвимость функций urlparse() и urljoin() библиотеки для разбора HTTP-запросов и формирования HTTP-ответов WebOb, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2024-42353

11 месяцев назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2024-42353

11 месяцев назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2024-42353

11 месяцев назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2024-42353

10 месяцев назад

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2024-42353

11 месяцев назад

WebOb provides objects for HTTP requests and responses. When WebOb nor ...

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3116-1

10 месяцев назад

Security update for python-WebOb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2970-1

10 месяцев назад

Security update for python-WebOb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2969-1

10 месяцев назад

Security update for python-WebOb

EPSS: Низкий
redos логотип

ROS-20241001-07

9 месяцев назад

Уязвимость python3-webob

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-mg3v-6m49-jhp3

11 месяцев назад

WebOb's location header normalization during redirect leads to open redirect

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-07761

Уязвимость функций urlparse() и urljoin() библиотеки для разбора HTTP-запросов и формирования HTTP-ответов WebOb, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.1
0%
Низкий
11 месяцев назад
ubuntu логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
11 месяцев назад
redhat логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
11 месяцев назад
msrc логотип
CVSS3: 6.1
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb nor ...

CVSS3: 6.1
0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3116-1

Security update for python-WebOb

0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2970-1

Security update for python-WebOb

0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2969-1

Security update for python-WebOb

0%
Низкий
10 месяцев назад
redos логотип
ROS-20241001-07

Уязвимость python3-webob

CVSS3: 6.1
0%
Низкий
9 месяцев назад
github логотип
GHSA-mg3v-6m49-jhp3

WebOb's location header normalization during redirect leads to open redirect

CVSS3: 6.1
0%
Низкий
11 месяцев назад

Уязвимостей на страницу