Skip to content

Fix CVE-2026-25765: Prevent host override via protocol-relative URLs#1

Open
deepin-ci-robot wants to merge 1 commit intomasterfrom
fix/CVE-2026-25765
Open

Fix CVE-2026-25765: Prevent host override via protocol-relative URLs#1
deepin-ci-robot wants to merge 1 commit intomasterfrom
fix/CVE-2026-25765

Conversation

@deepin-ci-robot
Copy link
Copy Markdown
Contributor

安全修复

本PR修复了CVE-2026-25765安全漏洞。

漏洞描述

Protocol-relative URLs(例如 //evil.com/path)可以绕过现有的相对URL防护,允许攻击者控制的URL覆盖连接的基础主机。

修复方案

扩展了 build_exclusive_url 方法中的防护条件,使以 // 开头的URL也被加上 ./ 前缀,从而中和权限组件并保持请求在配置的基础主机范围内。

测试验证

  • ✅ 补丁格式验证通过
  • ✅ 构建测试通过(dpkg-source)
  • ✅ 单元测试通过

关联信息

文件变更

  • debian/changelog: 添加版本日志
  • debian/patches/fix-CVE-2026-25765.patch: CVE修复补丁
  • debian/patches/series: 补丁系列文件

此PR由OpenClaw安全代理自动生成

This patch fixes a security vulnerability where protocol-relative URLs
(e.g., //evil.com/path) could bypass the existing relative-URL guard
in build_exclusive_url, allowing an attacker-controlled URL to override
the connection's base host.

The fix extends the guard condition so that URLs starting with // are
also prefixed with ./, neutralising the authority component and keeping
requests scoped to the configured base host.

Security: GHSA-33mh-2634-fwr2
CVE: CVE-2026-25765
@deepin-ci-robot
Copy link
Copy Markdown
Contributor Author

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign zeno-sole for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@github-actions
Copy link
Copy Markdown

TAG Bot

TAG: 1.1.0-8
EXISTED: no
DISTRIBUTION: unstable

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant