Description
st is a module for serving static files. An attacker is able to craft a request that results in an HTTP 301 (redirect) to an entirely different domain. A request for: http://some.server.com//nodesecurity.org/%2e%2e would result in a 301 to //nodesecurity.org/%2e%2e which most browsers treat as a proper redirect as // is translated into the current schema being used. Mitigating factor: In order for this to work, st must be serving from the root of a server (/) rather than the typical sub directory (/static/) and the redirect URL will end with some form of URL encoded .. ("%2e%2e", "%2e.", ".%2e").
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0375 | st is a module for serving static files. An attacker is able to craft a request that results in an HTTP 301 (redirect) to an entirely different domain. A request for: http://some.server.com//nodesecurity.org/%2e%2e would result in a 301 to //nodesecurity.org/%2e%2e which most browsers treat as a proper redirect as // is translated into the current schema being used. Mitigating factor: In order for this to work, st must be serving from the root of a server (/) rather than the typical sub directory (/static/) and the redirect URL will end with some form of URL encoded .. ("%2e%2e", "%2e.", ".%2e"). |
Github GHSA |
GHSA-72fg-jqhx-c68p | Open Redirect in st |
References
| Link | Providers |
|---|---|
| https://nodesecurity.io/advisories/547 |
|
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-16T20:47:48.660Z
Reserved: 2017-10-29T00:00:00.000Z
Link: CVE-2017-16224
No data.
Status : Modified
Published: 2018-06-07T02:29:07.723
Modified: 2024-11-21T03:16:04.270
Link: CVE-2017-16224
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA