Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-31137

Опубликовано: 01 апр. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1.

A flaw was found in react-router due to improper handling of user-controlled data within the Express adapter. This flaw allows a remote attacker to trigger a server-side request forgery (SSRF) condition. This SSRF can be exploited by sending crafted HTTP requests to arbitrary internal or external resources. Successful exploitation results in a high impact denial of service.

Отчет

This vulnerability allows URL spoofing, which can lead to unauthorized access to resources and potential data breaches. The fact that it requires no authentication or user interaction significantly increases its exploitability. The use of Host or X-Forwarded-Host headers, which are commonly used in web applications, makes this a widespread issue. While arbitrary code execution isn't directly possible based on the description, the ability to manipulate URLs and potentially access sensitive data warrants an Important impact rating.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4io.cryostat-cryostatNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Migration Toolkit for Applications 7mta/mta-ui-rhel9Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-ui-rhel8Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-console-plugin-rhel9Not affected
Migration Toolkit for Virtualizationmtv-candidate/mtv-console-plugin-rhel9Not affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel9Not affected
Network Observability Operatornetwork-observability/network-observability-console-plugin-rhel9Not affected
OpenShift Pipelinesopenshift-pipelines/pipelines-console-plugin-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2356710react-router: Remix Host Header Spoofing Vulnerability

EPSS

Процентиль: 2%
0.00014
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
5 месяцев назад

React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1.

CVSS3: 7.5
github
5 месяцев назад

Remix and React Router allow URL manipulation via Host / X-Forwarded-Host headers

EPSS

Процентиль: 2%
0.00014
Низкий

7.5 High

CVSS3