Report of Open Redirect Vulnerability in Python 3.9.19 - Utilizing Simple HTTP #132826
Labels
3.9
only security fixes
3.10
only security fixes
3.11
only security fixes
3.12
only security fixes
3.13
bugs and security fixes
3.14
new features, bugs and security fixes
pending
The issue will be closed if no feedback is provided
stdlib
Python modules in the Lib dir
type-bug
An unexpected behavior, bug, or error
type-security
A security issue
Bug Report
Description
We identified that when using Simple HTTP in Python 3.9.19 with the payload
/\\oast.me/%2e%2e%2f
, an open redirect vulnerability arises.This could potentially allow attackers to redirect users to malicious websites or resources, leading to phishing attacks or the exploitation of sensitive information.
Steps to Reproduce
/\\oast.me/%2e%2e%2f..
Output of curl
Issue
If the URL path contains
/\\oast.me/%2e%2e%2f
, the response of Location header includes/\oast.me/%2e%2e%2f/
.It redirects to
http://oast.me/..%2f/
.Expected Result
If the Location header starts with
/
, it is interpreted as a relative path on the same server.Version
3.9.19
3.9.21
3.8.18
3.12.5
OS
Ubuntu 20.04.6 LTS
Related Issue
#118312
The text was updated successfully, but these errors were encountered: