[issue43223] [security] http.server: Open Redirection if the URL path starts with //

2021-05-23 Thread Hamza Avvan
Hamza Avvan added the comment: Requested review for the unit test few days ago. Please check. https://github.com/python/cpython/pull/24848 -- ___ Python tracker <https://bugs.python.org/issue43

[issue43223] [security] http.server: Open Redirection if the URL path starts with //

2021-03-15 Thread Hamza Avvan
Change by Hamza Avvan : -- hgrepos: +404 ___ Python tracker <https://bugs.python.org/issue43223> ___ ___ Python-bugs-list mailing list Unsubscribe:

[issue43223] [security] http.server: Open Redirection if the URL path starts with //

2021-03-13 Thread Hamza Avvan
Change by Hamza Avvan : -- keywords: +patch pull_requests: +23609 stage: -> patch review pull_request: https://github.com/python/cpython/pull/24848 ___ Python tracker <https://bugs.python.org/issu

[issue43223] [security] http.server: Open Redirection if the URL path starts with //

2021-02-18 Thread Hamza AVvan
Hamza AVvan added the comment: As for the directory issue, not only .ssh but an attacker can use any directory to make the open redirection exploitable. And as for the HTTP Header Location, the server does not remove extra trailing slash from the PAYLOAD uri, which seems to be the cause of

[issue43223] [SECURITY] Open Redirection In Python 3.7 & 3.8

2021-02-15 Thread Hamza AVvan
Change by Hamza AVvan : -- title: Open Redirection In Python 3.7 & 3.8 -> [SECURITY] Open Redirection In Python 3.7 & 3.8 ___ Python tracker <https://bugs.python.

[issue43223] Open Redirection In Python 3.7 & 3.8

2021-02-14 Thread Hamza AVvan
New submission from Hamza AVvan : The provided version of python distros 3.8.7 and 3.7.4 are vulnerable to open redirection while traversing to an existing directory. # PAYLOAD http://127.0.0.1:8000//attacker.com/..%2f..%2f..%2f..%2f..%2f../%0a%0d/../.ssh In this case, the actual path of