Vulnerability Description
PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Powermux Project | Powermux | < 1.1.1 |
Related Weaknesses (CWE)
References
- https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52Third Party Advisory
- https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52Third Party Advisory
FAQ
What is CVE-2021-32721?
CVE-2021-32721 is a vulnerability with a CVSS score of 4.7 (MEDIUM). PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash r...
How severe is CVE-2021-32721?
CVE-2021-32721 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32721?
Check the references section above for vendor advisories and patch information. Affected products include: Powermux Project Powermux.