Skip to content

Conversation

@miss-islington
Copy link
Contributor

Fix an open redirection vulnerability in the http.server module when
an URI path starts with // that could produce a 301 Location header
with a misleading target. Vulnerability discovered, and logic fix
proposed, by Hamza Avvan (@hamzaavvan).

Test and comments authored by Gregory P. Smith [Google].
(cherry picked from commit 4abab6b)

Co-authored-by: Gregory P. Smith greg@krypto.org

…pythonGH-93879) Fix an open redirection vulnerability in the `http.server` module when an URI path starts with `//` that could produce a 301 Location header with a misleading target. Vulnerability discovered, and logic fix proposed, by Hamza Avvan (@hamzaavvan). Test and comments authored by Gregory P. Smith [Google]. (cherry picked from commit 4abab6b) Co-authored-by: Gregory P. Smith <greg@krypto.org>
@gpshead
Copy link
Member

Up to the RM team to decide is this minor security fix is worth going into such an old branch. Consider our statement about http.server in https://docs.python.org/3.7/library/http.server.html.

@miss-islington
Copy link
ContributorAuthor

Status check is done, and it's a success ✅ .

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment

Labels

type-bugAn unexpected behavior, bug, or errortype-securityA security issue

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants

@miss-islington@gpshead@ambv@bedevere-bot