Логотип exploitDog
bind:CVE-2024-42353
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42353

Количество 11

Количество 11

ubuntu логотип

CVE-2024-42353

около 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2024-42353

около 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2024-42353

около 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2024-42353

около 1 года назад

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2024-42353

около 1 года назад

WebOb provides objects for HTTP requests and responses. When WebOb nor ...

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3116-1

около 1 года назад

Security update for python-WebOb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2970-1

около 1 года назад

Security update for python-WebOb

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2969-1

около 1 года назад

Security update for python-WebOb

EPSS: Низкий
redos логотип

ROS-20241001-07

12 месяцев назад

Уязвимость python3-webob

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-mg3v-6m49-jhp3

около 1 года назад

WebOb's location header normalization during redirect leads to open redirect

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-07761

около 1 года назад

Уязвимость функций urlparse() и urljoin() библиотеки для разбора HTTP-запросов и формирования HTTP-ответов WebOb, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.

CVSS3: 6.1
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 6.1
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-42353

WebOb provides objects for HTTP requests and responses. When WebOb nor ...

CVSS3: 6.1
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3116-1

Security update for python-WebOb

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2970-1

Security update for python-WebOb

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2969-1

Security update for python-WebOb

0%
Низкий
около 1 года назад
redos логотип
ROS-20241001-07

Уязвимость python3-webob

CVSS3: 6.1
0%
Низкий
12 месяцев назад
github логотип
GHSA-mg3v-6m49-jhp3

WebOb's location header normalization during redirect leads to open redirect

CVSS3: 6.1
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-07761

Уязвимость функций urlparse() и urljoin() библиотеки для разбора HTTP-запросов и формирования HTTP-ответов WebOb, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.1
0%
Низкий
около 1 года назад

Уязвимостей на страницу