Skip to content

URL Redirection to Untrusted Site ('Open Redirect') in github.com/AndrewBurian/powermux

Moderate
AndrewBurian published GHSA-mj9r-wwm8-7q52 Jun 28, 2021

Package

gomod github.com/AndrewBurian/powermux (Go)

Affected versions

< v1.1.1

Patched versions

v.1.1.1

Description

Impact

Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.

Patches

The issue is resolved in v1.1.1

Workarounds

There are no existing workarounds.
You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. https://example.com//foo/

Severity

Moderate

CVE ID

CVE-2021-32721

Weaknesses

URL Redirection to Untrusted Site ('Open Redirect')

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. Learn more on MITRE.