GHSA-mj9r-wwm8-7q52

Suggest an improvement
Source
https://github.com/advisories/GHSA-mj9r-wwm8-7q52
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-mj9r-wwm8-7q52/GHSA-mj9r-wwm8-7q52.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mj9r-wwm8-7q52
Aliases
Related
Published
2021-07-01T17:00:32Z
Modified
2024-05-20T20:40:13Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Open Redirect in github.com/AndrewBurian/powermux
Details

Impact

Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.

Patches

The issue is resolved in v1.1.1

Workarounds

There are no existing workarounds. You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. https://example.com//foo/

Database specific
{
    "nvd_published_at": "2021-06-29T19:15:00Z",
    "cwe_ids": [
        "CWE-601"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-06-30T17:43:53Z"
}
References

Affected packages

Go / github.com/AndrewBurian/powermux

Package

Name
github.com/AndrewBurian/powermux
View open source insights on deps.dev
Purl
pkg:golang/github.com/AndrewBurian/powermux

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1