File CVE-2024-42353-url-redirection.patch of Package python-WebOb.35288

From f689bcf4f0a1f64f1735b1d5069aef5be6974b5b Mon Sep 17 00:00:00 2001
From: Delta Regeer <xistence@0x58.com>
Date: Wed, 7 Aug 2024 11:15:35 -0600
Subject: [PATCH] Add fix for open redirect

---
 src/webob/response.py  |  5 +++++
 tests/test_response.py | 11 +++++++++++
 2 files changed, 16 insertions(+)

Index: WebOb-1.7.4/tests/test_response.py
===================================================================
--- WebOb-1.7.4.orig/tests/test_response.py
+++ WebOb-1.7.4/tests/test_response.py
@@ -1365,3 +1365,13 @@ def test_app_iter_is_same():
     res = Response(status=204, app_iter=my_app_iter)
     assert res.app_iter == my_app_iter
     assert isinstance(res.app_iter, app_iter)
+
+def test_location_no_open_redirect():
+    # This is a test for a fix for CVE-2024-42353 and
+    # https://github.com/Pylons/webob/security/advisories/GHSA-mg3v-6m49-jhp3
+    res = Response()
+    res.status = "301"
+    res.location = "//www.example.com/test"
+    assert res.location == "//www.example.com/test"
+    req = Request.blank("/")
+    assert req.get_response(res).location == "http://localhost/%2fwww.example.com/test"
Index: WebOb-1.7.4/webob/response.py
===================================================================
--- WebOb-1.7.4.orig/webob/response.py
+++ WebOb-1.7.4/webob/response.py
@@ -1282,6 +1282,11 @@ class Response(object):
         if SCHEME_RE.search(value):
             return value
 
+        # This is to fix an open redirect issue due to the way that
+        # urlparse.urljoin works. See CVE-2024-42353 and
+        # https://github.com/Pylons/webob/security/advisories/GHSA-mg3v-6m49-jhp3
+        if value.startswith("//"):
+            value = "/%2f{}".format(value[2:])
         new_location = urlparse.urljoin(_request_uri(environ), value)
         return new_location
 
openSUSE Build Service is sponsored by