Vulnerability Description
Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Serve-Static Project | Serve-Static | <= 1.7.1 |
References
- http://nodesecurity.io/advisories/serve-static-open-redirect
- http://www.securityfocus.com/bid/72064
- https://bugzilla.redhat.com/show_bug.cgi?id=1181917
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99936
- https://github.com/expressjs/serve-static/issues/26
- http://nodesecurity.io/advisories/serve-static-open-redirect
- http://www.securityfocus.com/bid/72064
- https://bugzilla.redhat.com/show_bug.cgi?id=1181917
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99936
- https://github.com/expressjs/serve-static/issues/26
FAQ
What is CVE-2015-1164?
CVE-2015-1164 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks...
How severe is CVE-2015-1164?
CVE-2015-1164 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1164?
Check the references section above for vendor advisories and patch information. Affected products include: Serve-Static Project Serve-Static.