Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0201 | WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8. |
Github GHSA |
GHSA-mg3v-6m49-jhp3 | WebOb's location header normalization during redirect leads to open redirect |
Ubuntu USN |
USN-6984-1 | WebOb vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Jun 2025 11:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:ceph_storage:8.1::el9 |
Thu, 08 May 2025 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat ceph Storage
|
|
| CPEs | cpe:/a:redhat:ceph_storage:7.1::el8 | |
| Vendors & Products |
Redhat ceph Storage
|
Sat, 23 Nov 2024 00:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openstack:17.1::el8 cpe:/a:redhat:openstack:17.1::el9 |
Thu, 17 Oct 2024 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_ironic:4.13::el9 |
Wed, 09 Oct 2024 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift
|
|
| CPEs | cpe:/a:redhat:openshift:4.12::el9 | |
| Vendors & Products |
Redhat openshift
|
Fri, 04 Oct 2024 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_ironic:4.14::el9 |
Wed, 02 Oct 2024 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_ironic:4.15::el9 |
Wed, 25 Sep 2024 11:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Ironic
|
|
| CPEs | cpe:/a:redhat:openshift_ironic:4.16::el9 | |
| Vendors & Products |
Redhat openshift Ironic
|
Fri, 20 Sep 2024 04:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat openstack |
|
| CPEs | cpe:/a:redhat:openstack:18.0::el9 | |
| Vendors & Products |
Redhat
Redhat openstack |
Tue, 20 Aug 2024 04:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pylonsproject
Pylonsproject webob |
|
| CPEs | cpe:2.3:a:pylonsproject:webob:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pylonsproject
Pylonsproject webob |
Fri, 16 Aug 2024 22:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 15 Aug 2024 23:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Aug 2024 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8. | |
| Title | WebOb's location header normalization during redirect leads to open redirect | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-15T14:04:01.806Z
Reserved: 2024-07-30T14:01:33.922Z
Link: CVE-2024-42353
Updated: 2024-08-15T14:03:57.373Z
Status : Analyzed
Published: 2024-08-14T21:15:17.073
Modified: 2024-08-19T18:44:59.903
Link: CVE-2024-42353
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN