logo

CVE-2021-32721 github.com/andrewburian/powermux

Package

Manager: go
Name: github.com/andrewburian/powermux
Vulnerable Version: >=0 <1.1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.002 pctl0.42221

Details

Open Redirect in github.com/AndrewBurian/powermux ### Impact Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. ### Patches The issue is resolved in v1.1.1 ### Workarounds There are no existing workarounds. You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. `https://example.com//foo/`

Metadata

Created: 2021-07-01T17:00:32Z
Modified: 2024-05-20T20:40:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-mj9r-wwm8-7q52/GHSA-mj9r-wwm8-7q52.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-mj9r-wwm8-7q52
Finding: F156
Auto approve: 1