Lucene search

K
githubGitHub Advisory DatabaseGHSA-56P3-RRP4-2J82
HistoryMay 14, 2022 - 2:54 a.m.

Plone Open Redirection vulnerability via next parameter

2022-05-1402:54:25
CWE-601
GitHub Advisory Database
github.com
4

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.055 Low

EPSS

Percentile

93.2%

The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the “next” parameter to acl_users/credentials_cookie_auth/require_login.

Affected configurations

Vulners
Node
ploneploneRange<4.3.2
OR
ploneploneRange<4.2.6
OR
ploneploneRange<4.1.1
CPENameOperatorVersion
plonelt4.3.2
plonelt4.2.6
plonelt4.1.1

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.055 Low

EPSS

Percentile

93.2%