Name: URL Redirection to Untrusted Site ('Open Redirect')
Description: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
URL parsing in node-forge could lead to undesired behavior.
Fixed Patch
1.0.0
Impact
The regex used for the forge.util.parseUrl API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior.
Patches
forge.util.parseUrl and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API.
Workarounds
Ensure code does not directly or indirectly call forge.util.parseUrl with untrusted input.
Due Date: 2023-01-10
A low severity vulnerability has been discovered in your project.
Project Name: kondukto-ui-vue
Scanner Name: dependabot
Cwe ID: 601
Cwe Name: URL Redirection to Untrusted Site (Open Redirect)
Cwe Link: https://cwe.mitre.org/data/definitions/601.html
File: package-lock.json
Packages:
References:
Training(Secure Code Warrior):
Name: URL Redirection to Untrusted Site ('Open Redirect')
Description: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Link: https://portal.securecodewarrior.com/?utm_source=partner-integration:kondukto#/contextual-microlearning/web/uraf/generic
Videos:
Tool Description: ### Summary
URL parsing in node-forge could lead to undesired behavior.
Fixed Patch
1.0.0
Impact
The regex used for the
forge.util.parseUrl
API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior.Patches
forge.util.parseUrl
and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API.Workarounds
Ensure code does not directly or indirectly call
forge.util.parseUrl
with untrusted input.References
For more information
If you have any questions or comments about this advisory:
Kondukto Link: https://82.kondukto.local/projects/63b2e875fcd0c2a01b845757/vulns/appsec?page=1&perPage=15&id=in:63bbc8a5b3a8a9664878e6fa Deeplink: https://github.com/advisories/GHSA-gf8q-jrpm-jvxq