Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. The url `https:example.org` without slashes is considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0199 Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. The url `https:example.org` without slashes is considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.
Github GHSA Github GHSA GHSA-q3m9-9fj2-mfwr URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:33:55.913Z

Reserved: 2021-05-12T00:00:00

Link: CVE-2021-32806

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-02T19:15:08.133

Modified: 2024-11-21T06:07:47.067

Link: CVE-2021-32806

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.