CVE-2021-32721: Open Redirect in github.com/AndrewBurian/powermux
4.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42476%
CWE
Published
7/1/2021
Updated
5/30/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/AndrewBurian/powermux | go | < 1.1.1 | 1.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) The trailing slash redirection in ServeMux.getAll
didn't validate path structure, allowing redirects from paths with double slashes. 2) Route.execute
processed paths without checking for invalid consecutive slashes. The fix moved redirection logic to Route.execute
and added explicit checks for '//' patterns. The removed code in servemux.go
and modified logic in route.go
indicate these were the vulnerable areas.