Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mj9r-wwm8-7q52

Опубликовано: 01 июл. 2021
Источник: github
Github: Прошло ревью
CVSS3: 4.7

Описание

Open Redirect in github.com/AndrewBurian/powermux

Impact

Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.

Patches

The issue is resolved in v1.1.1

Workarounds

There are no existing workarounds. You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. https://example.com//foo/

Пакеты

Наименование

github.com/AndrewBurian/powermux

go
Затронутые версииВерсия исправления

< 1.1.1

1.1.1

EPSS

Процентиль: 42%
0.002
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 4.7
nvd
больше 4 лет назад

PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.

EPSS

Процентиль: 42%
0.002
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-601