File CVE-2024-42353-url-redirection.patch of Package python-WebOb.35288
From f689bcf4f0a1f64f1735b1d5069aef5be6974b5b Mon Sep 17 00:00:00 2001
From: Delta Regeer <xistence@0x58.com>
Date: Wed, 7 Aug 2024 11:15:35 -0600
Subject: [PATCH] Add fix for open redirect
---
src/webob/response.py | 5 +++++
tests/test_response.py | 11 +++++++++++
2 files changed, 16 insertions(+)
Index: WebOb-1.7.4/tests/test_response.py
===================================================================
--- WebOb-1.7.4.orig/tests/test_response.py
+++ WebOb-1.7.4/tests/test_response.py
@@ -1365,3 +1365,13 @@ def test_app_iter_is_same():
res = Response(status=204, app_iter=my_app_iter)
assert res.app_iter == my_app_iter
assert isinstance(res.app_iter, app_iter)
+
+def test_location_no_open_redirect():
+ # This is a test for a fix for CVE-2024-42353 and
+ # https://github.com/Pylons/webob/security/advisories/GHSA-mg3v-6m49-jhp3
+ res = Response()
+ res.status = "301"
+ res.location = "//www.example.com/test"
+ assert res.location == "//www.example.com/test"
+ req = Request.blank("/")
+ assert req.get_response(res).location == "http://localhost/%2fwww.example.com/test"
Index: WebOb-1.7.4/webob/response.py
===================================================================
--- WebOb-1.7.4.orig/webob/response.py
+++ WebOb-1.7.4/webob/response.py
@@ -1282,6 +1282,11 @@ class Response(object):
if SCHEME_RE.search(value):
return value
+ # This is to fix an open redirect issue due to the way that
+ # urlparse.urljoin works. See CVE-2024-42353 and
+ # https://github.com/Pylons/webob/security/advisories/GHSA-mg3v-6m49-jhp3
+ if value.startswith("//"):
+ value = "/%2f{}".format(value[2:])
new_location = urlparse.urljoin(_request_uri(environ), value)
return new_location