Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. docassemble.webapp
  4. ›
  5. CVE-2024-27291

CVE-2024-27291: Docassemble open redirect

February 29, 2024

Impact

It is possible to create a URL that acts as an open redirect.

Patches

The vulnerability has been patched in version 1.4.97 of the master branch. The Docker image on docker.io has been patched.

Workarounds

If upgrading is not possible, manually apply the changes of 4801ac7 and restart the server (e.g., by pressing Save on the Configuration screen).

Credit

The vulnerability was discovered by Riyush Ghimire (@richighimi).

For more information

If you have any questions or comments about this advisory:

  • Open an issue in docassemble
  • Join the Slack channel
  • Email us at jhpyle@gmail.com

References

  • github.com/advisories/GHSA-7wxf-r2qv-9xwr
  • github.com/jhpyle/docassemble
  • github.com/jhpyle/docassemble/commit/4801ac7ff7c90df00ac09523077930cdb6dea2aa
  • github.com/jhpyle/docassemble/security/advisories/GHSA-7wxf-r2qv-9xwr
  • nvd.nist.gov/vuln/detail/CVE-2024-27291

Code Behaviors & Features

Detect and mitigate CVE-2024-27291 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.4.97

Fixed versions

  • 1.4.97

Solution

Upgrade to version 1.4.97 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

pypi/docassemble.webapp/CVE-2024-27291.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:36 +0000.