Improper URL Parsing in Apache Knox SSO prior to 1.6.1 Allows for Open Redirect Attacks
CVE-2021-42357 · MEDIUM Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
Learn more about our Cis Benchmark Audit For Apache Http Server.