Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f4hq-453j-p95f

Опубликовано: 05 фев. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

Open redirect in Slashify

The package is an Express middleware that normalises routes by stripping any final slash, redirecting, for example, bookings/latest/ to bookings/latest. However, it does not validate the path it redirects to in any way. In particular, if the path starts with two slashes (or two backslashes, or a slash and a backslash, etc.) it may redirect to a different domain.

Consider the example from the docs. Assume we have run it and started a server on localhost:3000, then visiting localhost:3000///github.com/ redirects you to https://github.com.

Recommendation

This vulnerability is currently un-patched in the slashify package so there is no known safe version of this package. Discontinuing use of slashify is recommended.

Пакеты

Наименование

slashify

npm
Затронутые версииВерсия исправления

<= 1.0.0

Отсутствует

EPSS

Процентиль: 31%
0.00115
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 6.1
nvd
почти 5 лет назад

The slashify package 1.0.0 for Node.js allows open-redirect attacks, as demonstrated by a localhost:3000///example.com/ substring.

EPSS

Процентиль: 31%
0.00115
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601