Lucene search

K
cvelistSnykCVELIST:CVE-2022-25295
HistorySep 11, 2022 - 1:45 p.m.

CVE-2022-25295 Open Redirect

2022-09-1113:45:20
snyk
www.cve.org
2
cve-2022-25295
open redirect
gophish
version 0.12.0

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:U/RC:C

EPSS

0.001

Percentile

30.0%

This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue(“next”)) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\example.com, browser will redirect user to http://example.com.

CNA Affected

[
  {
    "product": "github.com/gophish/gophish",
    "vendor": "n/a",
    "versions": [
      {
        "lessThan": "0.12.0",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:U/RC:C

EPSS

0.001

Percentile

30.0%

Related for CVELIST:CVE-2022-25295