-
CVSS Score
-The vulnerability stems from two key functions: 1) is_safe_url's failure to handle URL parsing edge cases (validated by the patch adding checks for relative path validation and direct netloc comparison), and 2) get_redirect_url's trust in user-controlled 'next' parameter combined with the weak is_safe_url validation. The commit diff shows fundamental changes to both functions: is_safe_url gained explicit relative path checks, and get_redirect_url was rewritten to use flask.url_for() instead of direct URL validation, confirming these were the vulnerable components.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pyload-ng | pip | < 0.5.0b3.dev79 | 0.5.0b3.dev79 |
A Semantic Attack on Google Gemini - Read the Latest Research