st is a module for serving static files. An attacker is able to craft a request that results in an HTTP 301 (redirect) to an entirely different domain. A request for: http://some.server.com//nodesecurity.org/%2e%2e would result in a 301 to //nodesecurity.org/%2e%2e which most browsers treat as a proper redirect as // is translated into the current schema being used. Mitigating factor: In order for this to work, st must be serving from the root of a server (/) rather than the typical sub directory (/static/) and the redirect URL will end with some form of URL encoded .. ("%2e%2e", "%2e.", ".%2e").
References
Link | Resource |
---|---|
https://nodesecurity.io/advisories/547 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hackerone
Published: 2018-04-26T00:00:00
Updated: 2018-06-07T01:57:01
Reserved: 2017-10-29T00:00:00
Link: CVE-2017-16224
JSON object: View
NVD Information
Status : Modified
Published: 2018-06-07T02:29:07.723
Modified: 2019-10-09T23:24:59.707
Link: CVE-2017-16224
JSON object: View
Redhat Information
No data.
CWE