Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xh43-g2fq-wjrj

Опубликовано: 25 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 6.9

Описание

Angular SSR has an Open Redirect via X-Forwarded-Prefix

An Open Redirect vulnerability exists in the internal URL processing logic in Angular SSR. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash.

When an Angular SSR application is deployed behind a proxy that passes the X-Forwarded-Prefix header, an attacker can provide a value starting with three slashes (e.g., ///evil.com).

  1. The application processes a redirect (e.g., from a router redirectTo or i18n locale switch).
  2. Angular receives ///evil.com as the prefix.
  3. It strips one slash, leaving //evil.com.
  4. The resulting string is used in the Location header.
  5. Modern browsers interpret // as a protocol-relative URL, redirecting the user from https://your-app.com to https://evil.com.

Impact

This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking:

  • Scale: A single request can poison a high-traffic route, impacting all users until the cache expires.
  • SEO Poisoning: Search engine crawlers may follow and index these malicious redirects, causing the legitimate site to be delisted or associated with malicious domains.
  • Trust: Because the initial URL belongs to the trusted domain, users and security tools are less likely to flag the redirect as malicious.

Attack Preconditions

  • The application must use Angular SSR.
  • The application must have routes that perform internal redirects.
  • The infrastructure (Reverse Proxy/CDN) must pass the X-Forwarded-Prefix header to the SSR process without sanitization.
  • The cache must not vary on the X-Forwarded-Prefix header.

Patches

  • 21.2.0-rc.1
  • 21.1.5
  • 20.3.17
  • 19.2.21

Workarounds

Until the patch is applied, developers should sanitize the X-Forwarded-Prefix header in theirserver.ts before the Angular engine processes the request:

app.use((req, res, next) => { const prefix = req.headers['x-forwarded-prefix']?.trim(); if (prefix) { // Sanitize by removing all leading slashes req.headers['x-forwarded-prefix'] = prefix.replace(/^[/\\]+/, '/'); } next(); });

Resources

Пакеты

Наименование

@angular/ssr

npm
Затронутые версииВерсия исправления

>= 21.2.0-next.0, < 21.2.0-rc.0

21.2.0-rc.1

Наименование

@angular/ssr

npm
Затронутые версииВерсия исправления

>= 21.0.0-next.0, < 21.1.5

21.1.5

Наименование

@angular/ssr

npm
Затронутые версииВерсия исправления

>= 20.0.0-next.0, < 20.3.17

20.3.17

Наименование

@angular/ssr

npm
Затронутые версииВерсия исправления

>= 19.0.0-next.0, < 19.2.21

19.2.21

EPSS

Процентиль: 18%
0.00059
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-601

Связанные уязвимости

nvd
около 1 месяца назад

The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the `X-Forwarded-Prefix` header to the SSR process without sanitization, and the cache must not vary on the `X-Forwarded-Prefix` header. Versions 21.2.0-rc.1, 21.1.5, 20.

debian
около 1 месяца назад

The Angular SSR is a server-rise rendering tool for Angular applicatio ...

EPSS

Процентиль: 18%
0.00059
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-601