Description
Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. The url `https:example.org` without slashes is considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr
Patch, Third Party Advisory x_refsource_misc
https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba
Third Party Advisory third-party-advisory
x_refsource_jvn
http://jvn.jp/en/jp/JVN50804280/index.html
Scores
CVSS v3
6.5
EPSS
0.0030
EPSS Percentile
53.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Details
CWE
CWE-601
Status
published
Products (2)
plone/isurlinportal
< 1.2.0
pypi/Products.isurlinportal
0 - 1.2.0PyPI
Published
Aug 02, 2021
Tracked Since
Feb 18, 2026