CVE-2021-32721

PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:powermux_project:powermux:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
CVSS v2 : 5.8
v3 : 6.1
v2 : 5.8
v3 : 4.7
References () https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52 - Third Party Advisory () https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52 - Third Party Advisory

Information

Published : 2021-06-29 19:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32721

Mitre link : CVE-2021-32721

CVE.ORG link : CVE-2021-32721


JSON object : View

Products Affected

powermux_project

  • powermux
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')