Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q9rr-h3hx-m87g

Опубликовано: 02 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 5.1

Описание

BunkerWeb has Open Redirect Vulnerability in Loading Page

Summary:

A open redirect vulnerability exists in the loading endpoint, allowing attackers to redirect authenticated users to arbitrary external URLs via the "next" parameter.

Details:

The loading endpoint accepts and uses an unvalidated "next" parameter for redirects:

PoC:

Visit: /loading?next=https://google.com while authenticated. The page will redirect to google.com.

Impact:

This vulnerability could be used in phishing attacks by redirecting users from a legitimate application URL to malicious sites.

Пакеты

Наименование

github.com/bunkerity/bunkerweb

go
Затронутые версииВерсия исправления

< 1.5.11

1.5.11

EPSS

Процентиль: 23%
0.00077
Низкий

5.1 Medium

CVSS4

Дефекты

CWE-601

Связанные уязвимости

nvd
около 1 года назад

bunkerweb is an Open-source and next-generation Web Application Firewall (WAF). A open redirect vulnerability exists in the loading endpoint, allowing attackers to redirect authenticated users to arbitrary external URLs via the "next" parameter. The loading endpoint accepts and uses an unvalidated "next" parameter for redirects. Ex. visiting: `/loading?next=https://google.com` while authenticated will cause the page will redirect to google.com. This vulnerability could be used in phishing attacks by redirecting users from a legitimate application URL to malicious sites. This issue has been addressed in version 1.5.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 23%
0.00077
Низкий

5.1 Medium

CVSS4

Дефекты

CWE-601