Gophish before 0.12.0 vulnerable to Open Redirect
Moderate severity
GitHub Reviewed
Published
Sep 12, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Sep 11, 2022
Published to the GitHub Advisory Database
Sep 12, 2022
Reviewed
Sep 15, 2022
Last updated
Jan 27, 2023
This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\example.com, browser will redirect user to http://example.com.
References