Open Redirect in Flask-User
Moderate severity
GitHub Reviewed
Published
Aug 9, 2021
to the GitHub Advisory Database
•
Updated Sep 20, 2024
Description
Reviewed
Jul 6, 2021
Published to the GitHub Advisory Database
Aug 9, 2021
Last updated
Sep 20, 2024
This affects all versions of package Flask-User. When using the
make_safe_url
function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple backslashes such as/////evil.com/path
or\\\evil.com/path
. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified usingautocorrect_location_header=False
.References