Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cf57-c578-7jvv

Опубликовано: 30 окт. 2025
Источник: github
Github: Прошло ревью
CVSS4: 5.1
CVSS3: 0

Описание

Anubis vulnerable to possible XSS via redir parameter when using subrequest auth mode

Summary

When using subrequest authentication, Anubis did not perform validation of the redirect URL and redirects user to any URL scheme. While most modern browsers do not allow a redirect to javascript: URLs, it could still trigger dangerous behavior in some cases.

GET https://example.com/.within.website/?redir=javascript:alert() responds with Location: javascript:alert().

Impact

Anybody with a subrequest authentication seems affected. Using javascript: URLs will probably be blocked by most modern browsers, but using custom protocols for third-party applications might still trigger dangerous operations.

Note

This was originally reported by @mbiesiad against Weblate.

Пакеты

Наименование

github.com/TecharoHQ/anubis

go
Затронутые версииВерсия исправления

< 1.23.0

1.23.0

EPSS

Процентиль: 30%
0.00111
Низкий

5.1 Medium

CVSS4

0 Low

CVSS3

Дефекты

CWE-601
CWE-79

Связанные уязвимости

nvd
3 месяца назад

Anubis is a Web AI Firewall Utility that challenges users' connections in order to protect upstream resources from scraper bots. Prior to version 1.23.0, when using subrequest authentication, Anubis did not perform validation of the redirect URL and redirects user to any URL scheme. While most modern browsers do not allow a redirect to `javascript:` URLs, it could still trigger dangerous behavior in some cases. Anybody with a subrequest authentication may be affected. Version 1.23.0 contains a fix for the issue.

debian
3 месяца назад

Anubis is a Web AI Firewall Utility that challenges users' connections ...

EPSS

Процентиль: 30%
0.00111
Низкий

5.1 Medium

CVSS4

0 Low

CVSS3

Дефекты

CWE-601
CWE-79