GHSA-VG27-HR3V-3CQV
Vulnerability from github – Published: 2022-02-16 23:02 – Updated: 2023-02-28 16:49(From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838)
Summary: There was an open redirection vulnerability in the path of:
https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/
Description: An attacker can redirect anyone to malicious sites.
Steps To Reproduce: Type in this URL:
https://pollbot.services.mozilla.com/%0a/evil.com/
It redirects to that website
evil.com
evil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required.
Supporting Material/References: https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
Impact
Attackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "pollbot"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-0637"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": true,
"github_reviewed_at": "2022-02-16T23:02:09Z",
"nvd_published_at": "2023-02-16T22:15:00Z",
"severity": "MODERATE"
},
"details": "(From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838)\n\nSummary:\nThere was an open redirection vulnerability in the path of:\n\nhttps://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/\n\nDescription:\nAn attacker can redirect anyone to malicious sites.\n\nSteps To Reproduce:\nType in this URL:\n\nhttps://pollbot.services.mozilla.com/%0a/evil.com/\n\nIt redirects to that website\n\nevil.com\n\nevil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required.\n\nSupporting Material/References:\nhttps://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html\n\nImpact\n\nAttackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors.",
"id": "GHSA-vg27-hr3v-3cqv",
"modified": "2023-02-28T16:49:36Z",
"published": "2022-02-16T23:02:09Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/mozilla/PollBot/security/advisories/GHSA-vg27-hr3v-3cqv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0637"
},
{
"type": "WEB",
"url": "https://github.com/mozilla/PollBot/pull/360"
},
{
"type": "WEB",
"url": "https://github.com/mozilla/PollBot/commit/e39d8bec2df582ba525bb2e2f33c3ebc584d7ff8"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1753838"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2022-0637"
},
{
"type": "PACKAGE",
"url": "https://github.com/mozilla/PollBot"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "open redirect in pollbot"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.