Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/gophish/gophish/controllers
to version 0.12.0 or higher.
github.com/gophish/gophish/controllers is a package middleware is responsible for the definition/implementation of middleware functionality.
Affected versions of this package are vulnerable to Open Redirect. The Open Redirect vulnerability exists in the next
query parameter. The application uses url.Parse(r.FormValue("next"))
to extract path and eventually redirect user to a relative URL, but if next
parameter starts with multiple backslashes like \\\\\\example.com
, browser will redirect user to http://example.com
.