Vulnerability Description
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Knox | < 1.6.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/01/17/2Mailing ListThird Party Advisory
- https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7jMailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2022/01/17/2Mailing ListThird Party Advisory
- https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7jMailing ListVendor Advisory
FAQ
What is CVE-2021-42357?
CVE-2021-42357 is a vulnerability with a CVSS score of 6.1 (MEDIUM). When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter ...
How severe is CVE-2021-42357?
CVE-2021-42357 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-42357?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Knox.