GHSA-8hp3-rmr7-xh88

Suggest an improvement
Source
https://github.com/advisories/GHSA-8hp3-rmr7-xh88
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-8hp3-rmr7-xh88/GHSA-8hp3-rmr7-xh88.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8hp3-rmr7-xh88
Aliases
Published
2024-02-17T06:30:35Z
Modified
2024-06-28T15:58:25.424271Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Open Redirect in github.com/greenpau/caddy-security
Details

All versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection.

Database specific
{
    "nvd_published_at": "2024-02-17T05:15:09Z",
    "github_reviewed_at": "2024-02-20T23:47:36Z",
    "github_reviewed": true,
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

Go / github.com/greenpau/caddy-security

Package

Name
github.com/greenpau/caddy-security
View open source insights on deps.dev
Purl
pkg:golang/github.com/greenpau/caddy-security

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.1.23