// For flags

CVE-2021-32806

URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. The url `https:example.org` without slashes is considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.

Products.isurlinportal es un sustituto del método isURLInPortal de Plone. Unas versiones de Products.isurlinportal versiones anteriores a 1.2.0, presentan una vulnerabilidad de Open Redirect. Varias partes de Plone usa una comprobación "is url in portal" por seguridad, principalmente para ver si es seguro redirigir a una url. Una url como "https://example.org" no está en el portal. La url "https:example.org" sin barras es considerada que está en el portal. Cuando se redirige, algunos navegadores van a "https://example.org", otros dan un error. Unos atacantes pueden usar esto para redirigir a las víctimas a su sitio, especialmente como parte de un ataque de phishing. El problema ha sido parcheado en Products.isurlinportal versión 1.2.0

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-08-02 CVE Published
  • 2024-04-17 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Plone
Search vendor "Plone"
Isurlinportal
Search vendor "Plone" for product "Isurlinportal"
< 1.2.0
Search vendor "Plone" for product "Isurlinportal" and version " < 1.2.0"
plone
Affected