When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/01/17/2 Mailing List Third Party Advisory
https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7j Mailing List Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: apache

Published: 2022-01-17T19:25:09

Updated: 2022-01-17T21:06:09

Reserved: 2021-10-14T00:00:00


Link: CVE-2021-42357

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-01-17T20:15:07.697

Modified: 2022-01-24T19:22:35.153


Link: CVE-2021-42357

JSON object: View

cve-icon Redhat Information

No data.

CWE