Описание
gopkg.in/macaron.v1 Open Redirect vulnerability
macaron before 1.3.7 has an open redirect in the static handler. Due to improper request santization, a specifically crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-12666
- https://github.com/go-macaron/macaron/issues/198
- https://github.com/go-macaron/macaron/issues/198#issuecomment-622885959
- https://github.com/go-macaron/macaron/pull/199
- https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7
- https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245
- https://github.com/go-macaron/macaron/releases/tag/v1.3.7
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QEUOHRC4EN4WZ66EVFML2UCV7ZQ63XZ
- https://pkg.go.dev/vuln/GO-2020-0039
Пакеты
Наименование
gopkg.in/macaron.v1
go
Затронутые версииВерсия исправления
< 1.3.7
1.3.7
Связанные уязвимости
CVSS3: 6.1
redhat
почти 6 лет назад
macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL.
CVSS3: 6.1
nvd
почти 6 лет назад
macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL.