Closed
Description
Bug report
Bug description:
Vulnerability Details:
- Affected Version: Python 3.9.11
- Vulnerability Type: Open Redirect
- Payload: //interact.sh/%2f..
Description:
During our testing and analysis, we identified that when using Simple HTTP in Python 3.9.11 with the payload //interact.sh/%2f.., an open redirect vulnerability arises. This could potentially allow attackers to redirect users to malicious websites or resources, leading to phishing attacks or the exploitation of sensitive information.
Steps to Reproduce:
- Set up a server using Python 3.9.11 with Simple HTTP.
- Craft a payload containing //interact.sh/%2f..
- Attempt to access the server with the crafted payload.
- Observe the redirection behavior.
Impact:
This vulnerability poses a significant risk to the security of applications and systems utilizing Python 3.9.11, as it can be exploited by malicious actors to perform various attacks, including phishing and unauthorized access to sensitive information.
CPython versions tested on:
3.9
Operating systems tested on:
Linux, macOS, Windows