Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p6vg-p826-qp3v

Опубликовано: 05 окт. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

URL Redirection to Untrusted Site ('Open Redirect') in fastify-static

Impact

A redirect vulnerability in the fastify-static module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.

The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.

Patches

The issue has been patched in fastify-static@4.2.4

Workarounds

If updating is not an option, you can sanitize the input URLs using the rewriteUrl server option.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

fastify-static

npm
Затронутые версииВерсия исправления

< 4.2.4

4.2.4

EPSS

Процентиль: 39%
0.00172
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 5.3
redhat
больше 4 лет назад

A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.

CVSS3: 6.1
nvd
больше 4 лет назад

A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.

EPSS

Процентиль: 39%
0.00172
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-601