CVE-2021-32721

PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:powermux_project:powermux:*:*:*:*:*:*:*:*

History

06 Jul 2021, 15:17

Type Values Removed Values Added
References (CONFIRM) https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52 - (CONFIRM) https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 6.1
CWE CWE-601
CPE cpe:2.3:a:powermux_project:powermux:*:*:*:*:*:*:*:*

29 Jun 2021, 19:22

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-29 19:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-32721

Mitre link : CVE-2021-32721

CVE.ORG link : CVE-2021-32721


JSON object : View

Products Affected

powermux_project

  • powermux
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')