Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pgh6-m65r-2rhq

Опубликовано: 12 окт. 2021
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

DOS and Open Redirect with user input

Impact

A redirect vulnerability in the fastify-static module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e.

A DOS vulnerability is possible if the URL contains invalid characters curl --path-as-is "http://localhost:3000//^/.."

The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.

Patches

The issue has been patched in fastify-static@4.4.1

Workarounds

If updating is not an option, you can sanitize the input URLs using the rewriteUrl server option.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

fastify-static

npm
Затронутые версииВерсия исправления

>= 4.2.4, < 4.4.1

4.4.1

EPSS

Процентиль: 58%
0.00362
Низкий

8.8 High

CVSS3

Дефекты

CWE-248
CWE-601

Связанные уязвимости

CVSS3: 5.9
redhat
больше 4 лет назад

A redirect vulnerability in the `fastify-static` module version >= 4.2.4 and < 4.4.1 allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.

CVSS3: 8.8
nvd
больше 4 лет назад

A redirect vulnerability in the `fastify-static` module version >= 4.2.4 and < 4.4.1 allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость параметра redirect плагина для обслуживания статических файлов fastify-static, позволяющая нарушителю перенаправлять пользователей Mozilla Firefox на произвольные веб-сайты

EPSS

Процентиль: 58%
0.00362
Низкий

8.8 High

CVSS3

Дефекты

CWE-248
CWE-601