CVE-2024-53264: BunkerWeb has Open Redirect Vulnerability in Loading Page
5.1
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11802%
CWE
Published
12/2/2024
Updated
12/2/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/bunkerity/bunkerweb | go | < 1.5.11 | 1.5.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unvalidated use of the 'next' parameter in a redirect. In Go web applications, route handlers typically process
request parameters directly. The description explicitly states the loading endpoint uses an unvalidated 'next' parameter, which matches the pattern of a handler function extracting a query parameter and passing it to a redirect function without sanitization. While exact code isn't available, the combination of the vulnerability description, CWE-601 classification, and Go ecosystem patterns strongly suggests the handler function for the /loading
route is the vulnerable component.