-
-
Notifications
You must be signed in to change notification settings - Fork 31.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Report of Open Redirect Vulnerability in Python 3.9.11 - Utilizing Simple HTTP #118312
Comments
Please provide sample code. |
Thanks. For those using screen readers, it would be better to not paste an image. For reference, the command line is:
The documentation for the http module states: |
I think this is a duplicate of issue #87389 which was fixed in Python 3.9.14. When I apply that patch to 3.9.2, the example here ( |
Thanks for verifying, @tunedal. I'll wait a little while and then close this. @barttran2k: Does this resolve your issue? |
I have checked the fix information again and it is true that it has been fixed since 3.9.14. Thank you @tunedal @ericvsmith |
Bug report
Bug description:
Vulnerability Details:
Description:
During our testing and analysis, we identified that when using Simple HTTP in Python 3.9.11 with the payload //interact.sh/%2f.., an open redirect vulnerability arises. This could potentially allow attackers to redirect users to malicious websites or resources, leading to phishing attacks or the exploitation of sensitive information.
Steps to Reproduce:
Impact:
This vulnerability poses a significant risk to the security of applications and systems utilizing Python 3.9.11, as it can be exploited by malicious actors to perform various attacks, including phishing and unauthorized access to sensitive information.
CPython versions tested on:
3.9
Operating systems tested on:
Linux, macOS, Windows
The text was updated successfully, but these errors were encountered: