FreeBSD : gogs -- open redirect vulnerability (e53a908d-a645-11e8-8acd-10c37b4ac2ea)

high Nessus Plugin ID 112073

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

bluecatli (Tencent's Xuanwu Lab) reports :

The function isValidRedirect in gogs/routes/user/auth.go is used in login action to validate if url is on the same site.

If the Location header startswith /\, it will be transformed to // by browsers.

Solution

Update the affected package.

See Also

https://github.com/gogs/gogs/issues/5364

https://github.com/gogs/gogs/pull/5365

http://www.nessus.org/u?668587d7

http://www.nessus.org/u?6eac6bf2

Plugin Details

Severity: High

ID: 112073

File Name: freebsd_pkg_e53a908da64511e88acd10c37b4ac2ea.nasl

Version: 1.2

Type: local

Published: 8/23/2018

Updated: 11/10/2018

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gogs, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/22/2018

Vulnerability Publication Date: 8/6/2018