Improper URL Parsing in Apache Knox SSO prior to 1.6.1 Allows for Open Redirect Attacks

Improper URL Parsing in Apache Knox SSO prior to 1.6.1 Allows for Open Redirect Attacks

CVE-2021-42357 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.

Learn more about our Cis Benchmark Audit For Apache Http Server.