CVE-2021-22964: DOS and Open Redirect with user input
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5754%
CWE
Published
10/12/2021
Updated
2/1/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
fastify-static | npm | >= 4.2.4, < 4.4.1 | 4.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key points:
- getRedirectUrl() lacked validation for protocol-relative paths (//) and error handling for URL parsing, enabling open redirects and DOS via malformed URLs.
- The route handler executed getRedirectUrl() without a try/catch block, letting parsing errors propagate as uncaught exceptions. The patch added input validation to getRedirectUrl and error handling in the route handler, confirming these were the vulnerable points.