Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate vulnerability: Improper Authorization in Handler for Custom URL Scheme #1141

Open
SGeeversAtVortech opened this issue Jan 30, 2024 · 1 comment

Comments

@SGeeversAtVortech
Copy link
Contributor

In GitLab by @bentvelsen on Jan 30, 2024, 11:33

Issue created from vulnerability 101832940

Description:

The application was found passing in a non-literal value to the urllib methods which issue
requests. urllib supports the file:// scheme, which may allow an adversary who can control
the URL value to read arbitrary files on the file system.

To remediate this issue either hardcode the URLs being used in urllib or use the requests
module instead.

Example using the requests module to issue an HTTPS request:

import requests
# Issue a GET request to https://example.com with a timeout of 10 seconds
response = requests.get('https://example.com', timeout=10)
# Work with the response object
# ...

Identifiers:

Scanner:

  • Name: Semgrep
@SGeeversAtVortech
Copy link
Contributor Author

In GitLab by @bentvelsen on Jan 30, 2024, 11:34

I don't think this is an issue in our case, as we actually hardcode the url to be a https link to our gitlab repo. There is no way to change this link to for example the dangerous //file destination.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant