{"id":"GHSA-hvw3-p9px-gpc9","summary":"Gophish before 0.12.0 vulnerable to Open Redirect","details":"This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue(\"next\")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\\\\\\\example.com, browser will redirect user to http://example.com.","aliases":["CVE-2022-25295","GO-2022-0987"],"modified":"2024-08-21T16:28:58.334873Z","published":"2022-09-12T00:00:33Z","database_specific":{"cwe_ids":["CWE-601"],"github_reviewed":true,"severity":"MODERATE","nvd_published_at":"2022-09-11T14:15:00Z","github_reviewed_at":"2022-09-15T03:28:46Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25295"},{"type":"WEB","url":"https://github.com/gophish/gophish/pull/2262"},{"type":"WEB","url":"https://github.com/gophish/gophish/commit/2a452bda89ffdb85f929fa78290bce1f456881dc"},{"type":"PACKAGE","url":"https://github.com/gophish/gophish"},{"type":"WEB","url":"https://github.com/gophish/gophish/releases/tag/v0.12.0"},{"type":"WEB","url":"https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177"}],"affected":[{"package":{"name":"github.com/gophish/gophish","ecosystem":"Go","purl":"pkg:golang/github.com/gophish/gophish"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.12.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-hvw3-p9px-gpc9/GHSA-hvw3-p9px-gpc9.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}]}