Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22963

Опубликовано: 29 сент. 2021
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/search-ui-rhel8Affected
Red Hat Advanced Cluster Management for Kubernetes 2acm-grafana-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-must-gather-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2acm-operator-bundle-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2application-ui-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2assisted-image-service-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2cert-policy-controller-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2cluster-backup-operator-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2clusterclaims-controller-containerFixedRHSA-2022:073503.03.2022
Red Hat Advanced Cluster Management for Kubernetes 2cluster-curator-controller-containerFixedRHSA-2022:073503.03.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2015152fastify-static: open redirect via an URL with double slash followed by a domain

EPSS

Процентиль: 39%
0.00172
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 4 лет назад

A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.

CVSS3: 6.1
github
больше 4 лет назад

URL Redirection to Untrusted Site ('Open Redirect') in fastify-static

EPSS

Процентиль: 39%
0.00172
Низкий

5.3 Medium

CVSS3