blob: f06f8c223b3cf3c894dea1356ae5aa1a383dea91 [file] [log] [blame]
modules:
- module: github.com/caddyserver/caddy/v2
versions:
- fixed: 2.5.0-beta.1
vulnerable_at: 2.4.6
packages:
- package: github.com/caddyserver/caddy/v2/modules/caddyhttp
symbols:
- SanitizedPathJoin
skip_fix: |-
Cannot reproduce with normal vulnreport yet.
After the step `go get github.com/caddyserver/caddy/v2/modules/caddyhttp@v2.4.6`
in vulnreport, run `go1.18 get github.com/lucas-clemente/quic-go@v0.27.2`.
- package: github.com/caddyserver/caddy/v2/modules/caddyhttp/fileserver
symbols:
- FileServer.directoryListing
derived_symbols:
- FileServer.Provision
- FileServer.ServeHTTP
- MatchFile.Match
- MatchFile.UnmarshalCaddyfile
- MatchFile.Validate
- fileInfo.HumanModTime
- fileInfo.HumanSize
- statusOverrideResponseWriter.WriteHeader
skip_fix: See skip_fix for github.com/caddyserver/caddy/v2/modules/caddyhttp
description: |-
Due to improper request santization, a crafted URL can cause the static
file handler to redirect to an attacker chosen URL, allowing for open redirect
attacks.
cves:
- CVE-2022-28923
ghsas:
- GHSA-qpm3-vr34-h8w8
credit: Mayank Mukhi (@Hunt2behunter)
references:
- web: https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/
- fix: https://github.com/caddyserver/caddy/commit/78b5356f2b1945a90de1ef7f2c7669d82098edbd
- advisory: https://github.com/advisories/GHSA-qpm3-vr34-h8w8