Skip to content

Report of Open Redirect Vulnerability in Python 3.9.11 - Utilizing Simple HTTP #118312

Closed
@barttran2k

Description

@barttran2k

Bug report

Bug description:

Vulnerability Details:

  • Affected Version: Python 3.9.11
  • Vulnerability Type: Open Redirect
  • Payload: //interact.sh/%2f..

Description:
During our testing and analysis, we identified that when using Simple HTTP in Python 3.9.11 with the payload //interact.sh/%2f.., an open redirect vulnerability arises. This could potentially allow attackers to redirect users to malicious websites or resources, leading to phishing attacks or the exploitation of sensitive information.

Steps to Reproduce:

  1. Set up a server using Python 3.9.11 with Simple HTTP.
  2. Craft a payload containing //interact.sh/%2f..
  3. Attempt to access the server with the crafted payload.
  4. Observe the redirection behavior.

Impact:
This vulnerability poses a significant risk to the security of applications and systems utilizing Python 3.9.11, as it can be exploited by malicious actors to perform various attacks, including phishing and unauthorized access to sensitive information.

CPython versions tested on:

3.9

Operating systems tested on:

Linux, macOS, Windows

Metadata

Metadata

Assignees

No one assigned

    Labels

    type-bugAn unexpected behavior, bug, or errortype-securityA security issue

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions