All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107 | third party advisory exploit |
https://github.com/jakubroztocil/httpie/releases/tag/1.0.3 | third party advisory release notes |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00003.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00022.html | vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00031.html | mailing list |