CVE-2022-0637: open redirect in pollbot
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19201%
CWE
Published
2/16/2022
Updated
5/22/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pollbot | pip | < 1.4.6 | 1.4.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from the trailing slash redirect logic in handle_404. The original code used request.path.strip('/') to sanitize paths, but failed to account for whitespace characters (like %0a). Attackers could inject URLs like /%0a/evil.com/ which, after stripping '/' but not whitespace, would resolve to evil.com. The patch explicitly adds string.whitespace to the strip() call, confirming this was the root cause. The tests added in test_views.py validate that whitespace is now stripped, further corroborating the function's role in the vulnerability.