DOS and Open Redirect with user input
        
  High severity
        
          GitHub Reviewed
      
        Published
          Oct 11, 2021 
          in
          
            fastify/fastify-static
          
          •
          Updated Feb 1, 2023 
      
  
Description
        Reviewed
      Oct 11, 2021 
    
  
        Published to the GitHub Advisory Database
      Oct 12, 2021 
    
  
        Published by the National Vulnerability Database
      Oct 14, 2021 
    
  
        Last updated
      Feb 1, 2023 
    
  
Impact
A redirect vulnerability in the
fastify-staticmodule allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash//followed by a domain:http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e.A DOS vulnerability is possible if the URL contains invalid characters
curl --path-as-is "http://localhost:3000//^/.."The issue shows up on all the
fastify-staticapplications that setredirect: trueoption. By default, it isfalse.Patches
The issue has been patched in
[email protected]Workarounds
If updating is not an option, you can sanitize the input URLs using the
rewriteUrlserver option.References
For more information
If you have any questions or comments about this advisory:
References