Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-62595

Опубликовано: 21 окт. 2025
Источник: redhat
CVSS3: 4.3

Описание

Koa is expressive middleware for Node.js using ES2017 async functions. In versions 2.16.2 to before 2.16.3 and 3.0.1 to before 3.0.3, a bypass to CVE-2025-8129 was discovered in the Koa.js framework affecting its back redirect functionality. In certain circumstances, an attacker can manipulate the Referer header to force a user’s browser to navigate to an external, potentially malicious website. This occurs because the implementation incorrectly treats some specially crafted URLs as safe relative paths. Exploiting this vulnerability could allow attackers to perform phishing, social engineering, or other redirect-based attacks on users of affected applications. This issue has been patched in version 3.0.3.

A flaw was found in Koa. A bypass of CVE-2025-8129 was discovered in the Koa.js framework affecting its back redirect functionality. In certain circumstances, an attacker can manipulate the Referer header to force a user’s browser to navigate to an external, potentially malicious website. This occurs because the implementation incorrectly treats some specially crafted URLs as safe relative paths. This issue allows attackers to perform phishing, social engineering, or other redirect-based attacks on users of affected applications.

Отчет

To exploit this flaw, an attacker needs to convince a user into visiting a malicious link, limiting the possibility of exploitation. However, this vulnerability still has a moderate severity due to the impact of redirect-based attacks.

Меры по смягчению последствий

Applications can use the following workarounds to mitigate this vulnerability: Do not treat //host as a safe relative path. Explicitly exclude protocol‑relative values from any relative‑path branch. Normalize the Referer by resolving it with a base (e.g., new URL(rawRef, ctx.href)), then compare resolved.origin (scheme+host+port) to ctx.origin (or ctx.host plus scheme/port) before allowing the redirect.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-service-mesh/grafana-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-cni-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-must-gather-rhel9Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-operator-bundleNot affected
OpenShift Service Mesh 2openshift-service-mesh/istio-rhel8-operatorNot affected
OpenShift Service Mesh 2openshift-service-mesh/pilot-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/proxyv2-rhel9Not affected
OpenShift Service Mesh 2openshift-service-mesh/ratelimit-rhel8Not affected
OpenShift Service Mesh 3openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9Not affected
OpenShift Service Mesh 3openshift-service-mesh/istio-cni-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2405387koa: Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
6 месяцев назад

Koa is expressive middleware for Node.js using ES2017 async functions. In versions 2.16.2 to before 2.16.3 and 3.0.1 to before 3.0.3, a bypass to CVE-2025-8129 was discovered in the Koa.js framework affecting its back redirect functionality. In certain circumstances, an attacker can manipulate the Referer header to force a user’s browser to navigate to an external, potentially malicious website. This occurs because the implementation incorrectly treats some specially crafted URLs as safe relative paths. Exploiting this vulnerability could allow attackers to perform phishing, social engineering, or other redirect-based attacks on users of affected applications. This issue has been patched in version 3.0.3.

CVSS3: 4.3
debian
6 месяцев назад

Koa is expressive middleware for Node.js using ES2017 async functions. ...

CVSS3: 4.7
github
6 месяцев назад

Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic

4.3 Medium

CVSS3