Miggo Logo

CVE-2020-7936: Plone Open Redirect Vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.56092%
Published
5/24/2022
Updated
10/18/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Plonepip>= 4.0, < 4.3.204.3.20
Plonepip>= 5.0rc1, < 5.1.75.1.7
Plonepip>= 5.2.0, < 5.2.25.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper validation of redirect URLs. Multiple sources (Plone security hotfix notes, CVE description, and mailing list discussion) explicitly reference the isURLInPortal check being bypassed. This function is responsible for ensuring URLs belong to the portal domain before allowing redirects. The hotfix addressed this by strengthening its validation logic, confirming its role in the vulnerability. While no direct code diffs are available, the consistent references to this function across all vulnerability descriptions provide high-confidence attribution.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n op*n r**ir**t on t** lo*in *orm (*n* possi*ly ot**r pl***s) in Plon* *.* t*rou** *.*.* *llows *n *tt**k*r to *r**t * link to * Plon* Sit* t**t, w**n *ollow**, *n* possi*ly **t*r lo*in, will r**ir**t to *n *tt**k*r's sit*.

Reasoning

T** vuln*r**ility st*ms *rom improp*r `v*li**tion` o* r**ir**t URLs. Multipl* sour**s (Plon* s**urity *ot*ix not*s, *V* **s*ription, *n* m*ilin* list *is*ussion) *xpli*itly r***r*n** t** `isURLInPort*l` ****k **in* *yp*ss**. T*is *un*tion is r*sponsi