URL Redirection to Untrusted Site ('Open Redirect') Affecting org.dojotoolkit:dojo package, versions [,1.3.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.47% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about URL Redirection to Untrusted Site ('Open Redirect') vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGDOJOTOOLKIT-6239631
  • published9 Feb 2024
  • disclosed17 May 2022
  • creditUnknown

Introduced: 17 May 2022

CVE-2010-2274  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade org.dojotoolkit:dojo to version 1.3.3 or higher.

Overview

org.dojotoolkit:dojo is a foundation package for the Dojo 1 Toolkit. While still being maintained, new development is primarily focused on modern Dojo.

Affected versions of this package are vulnerable to URL Redirection to Untrusted Site ('Open Redirect') due to improper validation of user-supplied input in multiple components. An attacker can redirect users to arbitrary web sites and conduct phishing attacks by manipulating unspecified vectors, possibly related to iframe_history.html, FLAudio.js, FLVideo.js, audio.swf, video.swf, build.js, buildUtil.js, and runner.html.

References

CVSS Scores

version 3.1