CVE-2024-29041

Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode [using `encodeurl`](https://github.com/pillarjs/encodeurl) on the contents before passing it to the `location` header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted is `res.location()` but this is also called from within `res.redirect()`. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
GitHub_MCNA
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
Debian logo
Debian Releases
Debian Product
Codename
node-express
bullseye
no-dsa
bookworm
no-dsa
buster
postponed
trixie
4.21.2+~cs8.36.27-2
fixed
sid
4.21.2+~cs8.36.27-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
node-express
plucky
not-affected
oracular
not-affected
noble
not-affected
mantic
ignored
jammy
Fixed 4.17.3+~4.17.13-1ubuntu0.1~esm1
released
focal
Fixed 4.17.1-2ubuntu0.1~esm1
released
bionic
Fixed 4.1.1~dfsg-1ubuntu0.18.04.1~esm1
released
xenial
Fixed 4.1.1~dfsg-1ubuntu0.16.04.1~esm1
released