7.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P
6.9 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.0%
Versions of the package follow-redirects before 1.15.4 are vulnerable to
Improper Input Validation due to the improper handling of URLs by the
url.parse() function. When new URL() throws an error, it can be manipulated
to misinterpret the hostname. An attacker could exploit this weakness to
redirect traffic to a malicious site, potentially leading to information
disclosure, phishing attacks, or other security breaches.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | node-follow-redirects | <ย any | UNKNOWN |
ubuntu | 20.04 | noarch | node-follow-redirects | <ย any | UNKNOWN |
ubuntu | 22.04 | noarch | node-follow-redirects | <ย any | UNKNOWN |
ubuntu | 23.10 | noarch | node-follow-redirects | <ย any | UNKNOWN |
ubuntu | 24.04 | noarch | node-follow-redirects | <ย any | UNKNOWN |
7.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P
6.9 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.0%