Description
A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2234 | A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false. |
Github GHSA |
GHSA-p6vg-p826-qp3v | URL Redirection to Untrusted Site ('Open Redirect') in fastify-static |
References
History
Sun, 08 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat acm |
|
| CPEs | cpe:/a:redhat:acm:2.4::el8 | |
| Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat
Redhat acm |
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-03T18:58:26.158Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-22963
No data.
Status : Modified
Published: 2021-10-14T15:15:08.877
Modified: 2024-11-21T05:51:01.890
Link: CVE-2021-22963
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA