CVE-2021-32721 – github.com/andrewburian/powermux
Package
Manager: go
Name: github.com/andrewburian/powermux
Vulnerable Version: >=0 <1.1.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.002 pctl0.42221
Details
Open Redirect in github.com/AndrewBurian/powermux ### Impact Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. ### Patches The issue is resolved in v1.1.1 ### Workarounds There are no existing workarounds. You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. `https://example.com//foo/`
Metadata
Created: 2021-07-01T17:00:32Z
Modified: 2024-05-20T20:40:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-mj9r-wwm8-7q52/GHSA-mj9r-wwm8-7q52.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-mj9r-wwm8-7q52
Finding: F156
Auto approve: 1