PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.
References
Link | Resource |
---|---|
https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52 | Third Party Advisory |
Configurations
History
06 Jul 2021, 15:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.1 |
CWE | CWE-601 | |
CPE | cpe:2.3:a:powermux_project:powermux:*:*:*:*:*:*:*:* |
29 Jun 2021, 19:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-29 19:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-32721
Mitre link : CVE-2021-32721
CVE.ORG link : CVE-2021-32721
JSON object : View
Products Affected
powermux_project
- powermux
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')