Vulnerability Name: | CVE-2021-3189 (CCN-197154) | ||||||||||||
Assigned: | 2021-02-12 | ||||||||||||
Published: | 2021-02-12 | ||||||||||||
Updated: | 2022-05-23 | ||||||||||||
Summary: | The slashify package 1.0.0 for Node.js allows open-redirect attacks, as demonstrated by a localhost:3000///example.com/ substring. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:U/RC:R)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-601 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3189 Source: XF Type: UNKNOWN nodejs-cve20213189-open-redirect(197154) Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210401-0004/ Source: CCN Type: GHSL-2020-199 Open redirect vulnerability in Slashify - CVE-2021-3189 Source: MISC Type: Exploit, Third Party Advisory https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify Source: CCN Type: IBM Security Bulletin 6436083 (Business Automation Workflow) Multiple vulnerabilities in node.js may affect configuration editor used in IBM Business Automation Workflow and IBM Business Process Manager (BPM) - CVE-2020-1971, CVE-2020-8265, CVE-2020-8287 Source: CCN Type: IBM Security Bulletin 6463275 (Event Streams) IBM Event Streams is potentially affected by multiple node vulnerabilities Source: CCN Type: NPM Web site slashify Source: CCN Type: NPM Web site slashify Source: MISC Type: Product https://www.npmjs.com/package/slashify Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-3189 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |