CVE-2021-42357

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-42357
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-42357.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-42357
Aliases
Withdrawn
2024-09-03T04:41:13.811550Z
Published
2022-01-17T20:15:07Z
Modified
2024-09-03T03:56:44.236222Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.

References

Affected packages

Git / github.com/apache/knox

Affected ranges

Type
GIT
Repo
https://github.com/apache/knox
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0-m1
v0.10.0-branch
v0.11.0-branch
v0.12.0-branch
v0.13.0-branch
v0.14.0-branch
v0.2.0-branch
v0.2.0-rc1
v0.2.0-rc2
v0.3.0-branch
v0.4.0-branch
v0.5.0-branch
v0.6.0-branch
v0.7.0-branch
v0.8.0-branch
v0.9.0-branch

v1.*

v1.0.0-branch
v1.1.0-branch
v1.2.0-branch
v1.3.0-branch
v1.4.0-branch
v1.5.0-branch
v1.6.0-RC1
v1.6.0-RC2
v1.6.0-RC3
v1.6.0-RC4
v1.6.0-release