Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c3x7-gjmx-r2ff

Опубликовано: 31 авг. 2020
Источник: github
Github: Прошло ревью
CVSS3: 3.1

Описание

Open Redirect in serve-static

Versions of serve-static prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory.

Proof of Concept

A link to http://example.com//www.google.com/%2e%2e will redirect to //www.google.com/%2e%2e

Some browsers will interpret this as http://www.google.com/%2e%2e, resulting in an external redirect.

Recommendation

Version 1.7.x: Update to version 1.7.2 or later. Version 1.6.x: Update to version 1.6.5 or later.

Пакеты

Наименование

serve-static

npm
Затронутые версииВерсия исправления

< 1.6.5

1.7.2

Наименование

serve-static

npm
Затронутые версииВерсия исправления

>= 1.7.0, < 1.7.2

1.7.2

EPSS

Процентиль: 53%
0.003
Низкий

3.1 Low

CVSS3

Дефекты

CWE-601

Связанные уязвимости

ubuntu
около 11 лет назад

Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI.

nvd
около 11 лет назад

Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI.

debian
около 11 лет назад

Open redirect vulnerability in the serve-static plugin before 1.7.2 fo ...

EPSS

Процентиль: 53%
0.003
Низкий

3.1 Low

CVSS3

Дефекты

CWE-601