logo

CVE-2022-0637 pollbot

Package

Manager: pip
Name: pollbot
Vulnerable Version: >=0 <1.4.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0006 pctl0.19085

Details

open redirect in pollbot (From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838) Summary: There was an open redirection vulnerability in the path of: https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/ Description: An attacker can redirect anyone to malicious sites. Steps To Reproduce: Type in this URL: https://pollbot.services.mozilla.com/%0a/evil.com/ It redirects to that website evil.com evil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required. Supporting Material/References: https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html Impact Attackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors.

Metadata

Created: 2022-02-16T23:02:09Z
Modified: 2023-02-28T16:49:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-vg27-hr3v-3cqv/GHSA-vg27-hr3v-3cqv.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-vg27-hr3v-3cqv
Finding: F156
Auto approve: 1