Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cmfh-8f8r-fj96

Опубликовано: 12 апр. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

Phoenix Arbitrary URL Redirect

The Phoenix team designed Phoenix.Controller.redirect/2 to protect against redirects allowing user input to redirect to an external URL where your application code otherwise assumes a local path redirect. This is why the :to option is used for “local” URL redirects and why you must pass the :external option to intentionally allow external URLs to be redirected to. It has been disclosed that carefully crafted user input may be treated by some browsers as an external URL. An attacker can use this vulnerability to aid in social engineering attacks. The most common use would be to create highly believable phishing attacks. For example, the following user input would pass local URL validation, but be treated by Chrome and Firefox as external URLs: http://localhost:4000/?redirect=/\nexample.com Not all browsers are affected, but latest Chrome and Firefox will issue a get request for example.com and successfully redirect externally

Пакеты

Наименование

phoenix

Затронутые версииВерсия исправления

< 1.0.6

1.0.6

Наименование

phoenix

Затронутые версииВерсия исправления

>= 1.1.0, < 1.1.8

1.1.8

Наименование

phoenix

Затронутые версииВерсия исправления

>= 1.2.0, < 1.2.3

1.2.3

EPSS

Процентиль: 82%
0.01805
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 6.1
nvd
около 8 лет назад

The Phoenix Framework versions 1.0.0 through 1.0.4, 1.1.0 through 1.1.6, 1.2.0, 1.2.2 and 1.3.0-rc.0 are vulnerable to unvalidated URL redirection, which may result in phishing or social engineering attacks.

EPSS

Процентиль: 82%
0.01805
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601