CVE-2023-28370: Open redirect in Tornado
(updated )
Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
References
- github.com/advisories/GHSA-hj3f-6gcp-jg8j
- github.com/pypa/advisory-database/tree/main/vulns/tornado/PYSEC-2023-75.yaml
- github.com/tornadoweb/tornado
- github.com/tornadoweb/tornado/commit/32ad07c54e607839273b4e1819c347f5c8976b2f
- github.com/tornadoweb/tornado/releases/tag/v6.3.2
- jvn.jp/en/jp/JVN45127776
- nvd.nist.gov/vuln/detail/CVE-2023-28370
Detect and mitigate CVE-2023-28370 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →