Skip to content

open redirect in [pollbot.services.mozilla.com]

Moderate
gbrownmozilla published GHSA-vg27-hr3v-3cqv Feb 16, 2022

Package

pollbot (python)

Affected versions

<1.4.6

Patched versions

1.4.6

Description

(From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838)

Summary:
There was an open redirection vulnerability in the path of:

https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/

Description:
An attacker can redirect anyone to malicious sites.

Steps To Reproduce:
Type in this URL:

https://pollbot.services.mozilla.com/%0a/evil.com/

It redirects to that website

evil.com

evil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required.

Supporting Material/References:
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html

Impact

Attackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors.

Severity

Moderate

CVE ID

CVE-2022-0637

Weaknesses

No CWEs

Credits