Vulnerability Name: | CVE-2021-28861 (CCN-234228) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-02-14 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-02-14 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-05-03 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Python could allow a remote attacker to conduct phishing attacks, caused by <an open redirect vulnerability in lib/http/server.py. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
6.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Other | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-28861 Source: CCN Type: Python bug tracker Issue43223 http.server: Open Redirection if the URL path starts with Source: cve@mitre.org Type: Issue Tracking, Vendor Advisory cve@mitre.org Source: XF Type: UNKNOWN python-cve202128861-open-redirect(234228) Source: cve@mitre.org Type: Patch, Third Party Advisory cve@mitre.org Source: CCN Type: Python GIT Repository gh-87389: Fix an open redirection vulnerability in http.server. #93879 Source: cve@mitre.org Type: Patch, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: UNKNOWN cve@mitre.org | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |