When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vv38-4xcj-q4rw | Cross-site Scripting in Apache Knox SSO |
Fixes
Solution
No solution given by the vendor.
Workaround
1.x users should upgrade to 1.6.1. Unsupported versions of the 0.x line that include this issue are: 0.13.0, 0.14.0. and these should upgrade to 1.6.1 as well. 1.0.0 and 1.1.0 are also Unsupported but affected and should upgrade to 1.6.1.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T03:30:38.347Z
Reserved: 2021-10-14T00:00:00
Link: CVE-2021-42357
No data.
Status : Modified
Published: 2022-01-17T20:15:07.697
Modified: 2024-11-21T06:27:39.103
Link: CVE-2021-42357
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA