CVE-2024-29041
25.03.2024, 21:15
Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode [using `encodeurl`](https://github.com/pillarjs/encodeurl) on the contents before passing it to the `location` header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted is `res.location()` but this is also called from within `res.redirect()`. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3.
| Vendor | Product | Version |
|---|---|---|
| openjsf | express | 𝑥 < 4.19.2 |
| openjsf | express | 5.0.0:alpha1 |
| openjsf | express | 5.0.0:alpha2 |
| openjsf | express | 5.0.0:alpha3 |
| openjsf | express | 5.0.0:alpha4 |
| openjsf | express | 5.0.0:alpha5 |
| openjsf | express | 5.0.0:alpha6 |
| openjsf | express | 5.0.0:alpha7 |
| openjsf | express | 5.0.0:alpha8 |
| openjsf | express | 5.0.0:beta1 |
| openjsf | express | 5.0.0:beta2 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| node-express |
|
Common Weakness Enumeration
References