Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jqxr-vjvv-899m

Опубликовано: 14 июн. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

@keystone-6/auth Open Redirect vulnerability

Summary

There is an open redirect in the @keystone-6/auth package, where the redirect leading / filter can be bypassed.

Impact

Users may be redirected to domains other than the relative host, thereby it might be used by attackers to re-direct users to an unexpected location.

Mitigations

  • Don't use the @keystone-6/auth package

References

Similar Vulnerability Reports

Credits

Thanks to morioka12 for reporting this problem.

If you have any questions around this security advisory, please don't hesitate to contact us at security@keystonejs.com, or open an issue on GitHub.

If you have a security flaw to report for any software in this repository, please see our SECURITY policy.

Пакеты

Наименование

@keystone-6/auth

npm
Затронутые версииВерсия исправления

< 7.0.0

7.0.0

EPSS

Процентиль: 6%
0.00024
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 6.1
nvd
больше 2 лет назад

Keystone is a content management system for Node.JS. There is an open redirect in the `@keystone-6/auth` package versions 7.0.0 and prior, where the redirect leading `/` filter can be bypassed. Users may be redirected to domains other than the relative host, thereby it might be used by attackers to re-direct users to an unexpected location. To mitigate this issue, one may apply a patch from pull request 8626 or avoid using the `@keystone-6/auth` package.

EPSS

Процентиль: 6%
0.00024
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601