Loading HuntDB...

CVE-2015-1164

UNKNOWN
Published 2015-01-21T15:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2015-1164. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed LOW

Open Redirect in serve-static

GHSA-c3x7-gjmx-r2ff

Advisory Details

Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory. ## Proof of Concept A link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e` Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect. ## Recommendation Version 1.7.x: Update to version 1.7.2 or later. Version 1.6.x: Update to version 1.6.5 or later.

Affected Packages

npm serve-static
ECOSYSTEM: ≥0 <1.7.2
npm serve-static
ECOSYSTEM: ≥1.7.0 <1.7.2

CVSS Scoring

CVSS Score

2.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: August 31, 2020, Modified: September 23, 2021

References

HackerOne Reports

Published: 2015-01-21T15:00:00
Last Modified: 2024-08-06T04:33:20.662Z
Copied to clipboard!