|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Node.js hekto: open redirect
Synthesis of the vulnerability
An attacker can deceive the user of Node.js hekto, in order to redirect him to a malicious site.
Impacted products: Nodejs Modules ~ not comprehensive.
Consequences: user access/rights, data reading.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 23/05/2018.
Description of the vulnerability
The hekto module can be installed on Node.js.
However, the web service accepts to redirect the victim with no warning, to an external site indicated by the attacker.
An attacker can therefore deceive the user of Node.js hekto, in order to redirect him to a malicious site.
Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides application vulnerability analysis. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.