Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-42353
HistoryAug 14, 2024 - 12:00 a.m.

CVE-2024-42353

2024-08-1400:00:00
ubuntu.com
ubuntu.com
webob
http
location
header
hostname
urlparse
urljoin
python
vulnerability
patch

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

WebOb provides objects for HTTP requests and responses. When WebOb
normalizes the HTTP Location header to include the request hostname, it
does so by parsing the URL that the user is to be redirected to with
Python’s urlparse, and joining it to the base URL. urlparse however
treats a // at the start of a string as a URI without a scheme, and then
treats the next part as the hostname. urljoin will then use that hostname
from the second part as the hostname replacing the original one from the
request. This vulnerability is patched in WebOb version 1.8.8.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchpython-webob< anyUNKNOWN
ubuntu20.04noarchpython-webob< 1:1.8.5-2ubuntu0.1UNKNOWN
ubuntu22.04noarchpython-webob< 1:1.8.6-1.1ubuntu0.1UNKNOWN
ubuntu24.04noarchpython-webob< 1:1.8.7-1ubuntu0.1.24.04.1UNKNOWN
ubuntu16.04noarchpython-webob< anyUNKNOWN

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High