This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\example.com, browser will redirect user to http://example.com.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: snyk

Published: 2022-09-11T00:00:00

Updated: 2022-09-11T13:45:20

Reserved: 2022-02-16T00:00:00


Link: CVE-2022-25295

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-09-11T14:15:08.803

Modified: 2022-09-15T03:41:58.597


Link: CVE-2022-25295

JSON object: View

cve-icon Redhat Information

No data.

CWE