Description
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
No analysis available yet.
Remediation
Vendor Workaround
1.x users should upgrade to 1.6.1. Unsupported versions of the 0.x line that include this issue are: 0.13.0, 0.14.0. and these should upgrade to 1.6.1 as well. 1.0.0 and 1.1.0 are also Unsupported but affected and should upgrade to 1.6.1.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vv38-4xcj-q4rw | Cross-site Scripting in Apache Knox SSO |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T03:30:38.347Z
Reserved: 2021-10-14T00:00:00.000Z
Link: CVE-2021-42357
No data.
Status : Modified
Published: 2022-01-17T20:15:07.697
Modified: 2024-11-21T06:27:39.103
Link: CVE-2021-42357
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA