CVE-2017-1000163: Phoenix Arbitrary URL Redirect
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.81931%
CWE
Published
4/12/2022
Updated
9/7/2023
KEV Status
No
Technology
Erlang
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
phoenix | erlang | < 1.0.6 | 1.0.6 |
phoenix | erlang | >= 1.1.0, < 1.1.8 | 1.1.8 |
phoenix | erlang | >= 1.2.0, < 1.2.3 | 1.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability directly stems from Phoenix.Controller.redirect/2
's handling of the :to parameter, as explicitly stated in the advisory. The function's security boundary between local (:to) and external (:external) redirects was bypassable via newline injection. The temporary fix provided in the Elixir
forum post specifically overrides this function to add newline detection, confirming its central role in the vulnerability. The file path is standard for Phoenix
's controller implementation.