Safety vulnerability ID: 65858
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
Latest version: 2.1.1
full-stack framework for rapid development and prototyping
of secure database-driven web-based applications, written and
programmable in Python.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application