-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'GHSA-v6wp-4m6f-gcjg' into master
This patch fixes an open redirect vulnerability bug in `aiohttp.web_middlewares.normalize_path_middleware` by making sure that there's at most one slash at the beginning of the `Location` header value. Refs: * https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html * GHSA-v6wp-4m6f-gcjg
- Loading branch information
Showing
3 changed files
with
42 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
**(SECURITY BUG)** Started preventing open redirects in the | ||
``aiohttp.web.normalize_path_middleware`` middleware. For | ||
more details, see | ||
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg. | ||
|
||
Thanks to `Beast Glatisant <https://github.com/g147>`__ for | ||
finding the firstinstance of this issue and `Jelmer Vernooij | ||
<https://jelmer.uk/>`__ for reporting and tracking it down | ||
in aiohttp. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2545222
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @webknjaz,
Just to be sure, this isn't affecting v1.2.0 of this library, no? 🙈
I know this is a very old version but with my LTS team hat on, I want to ensure that the version of python-aiohttp in Debian Stretch is not affected. Please let me know what you think!?
Thanks for your work on this! ❤️
2545222
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @utkarsh2102, it shouldn't since it was added in
v1.3.0
: 8c44b21. But that version is so outdated that nobody should be using it because it's been unsupported for years.2545222
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Perfect, thank you so much!
Even though it's not being used directly by developers, we support all the packages in Debian Stretch as a part of LTS maintenance, so we tend to fix most of the security issues by backporting the patches to stable and oldstable releases. 😄