Lucene search

K
githubGitHub Advisory DatabaseGHSA-56P3-RRP4-2J82
HistoryMay 14, 2022 - 2:54 a.m.

Plone Open Redirection vulnerability via next parameter

2022-05-1402:54:25
CWE-601
GitHub Advisory Database
github.com
7
plone
open redirection
vulnerability
urltool
in_portal.py
allow_external_login_sites
filtering property
phishing attacks

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.055

Percentile

93.2%

The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the “next” parameter to acl_users/credentials_cookie_auth/require_login.

Affected configurations

Vulners
Node
ploneploneRange<4.3.2
OR
ploneploneRange<4.2.6
OR
ploneploneRange<4.1.1

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.055

Percentile

93.2%