Логотип exploitDog
bind: "CVE-2024-42353"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-42353"

Количество 11

Количество 11

ubuntu логотип

CVE-2024-42353

больше 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2024-42353

больше 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2024-42353

больше 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2024-42353

больше 1 года назад

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2024-42353

больше 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb nor ...

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3116-1

больше 1 года назад

Security update for python-WebOb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2970-1

больше 1 года назад

Security update for python-WebOb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2969-1

больше 1 года назад

Security update for python-WebOb

EPSS: Низкий
github логотип

GHSA-mg3v-6m49-jhp3

больше 1 года назад

WebOb's location header normalization during redirect leads to open redirect

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-07761

больше 1 года назад

Уязвимость функций urlparse() и urljoin() библиотеки для разбора HTTP-запросов и формирования HTTP-ответов WebOb, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.1
EPSS: Низкий
redos логотип

ROS-20241001-07

больше 1 года назад

Уязвимость python3-webob

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 6.1
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb nor ...

CVSS3: 6.1
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3116-1

Security update for python-WebOb

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2970-1

Security update for python-WebOb

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2969-1

Security update for python-WebOb

0%
Низкий
больше 1 года назад
github логотип
GHSA-mg3v-6m49-jhp3

WebOb's location header normalization during redirect leads to open redirect

CVSS3: 6.1
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-07761

Уязвимость функций urlparse() и urljoin() библиотеки для разбора HTTP-запросов и формирования HTTP-ответов WebOb, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.1
0%
Низкий
больше 1 года назад
redos логотип
ROS-20241001-07

Уязвимость python3-webob

CVSS3: 6.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу