Dismissed
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
5 packages
- python312Packages.pyqwikswitch
- python313Packages.pyqwikswitch
- python314Packages.pyqwikswitch
- home-assistant-component-tests.qwikswitch
- tests.home-assistant-component-tests.qwikswitch
- @LeSuisse dismissed
Qwik City Open Redirect via fixTrailingSlash
Qwik is a performance focused javascript framework. Prior to version 1.19.0, an Open Redirect vulnerability in Qwik City's default request handler middleware allows a remote attacker to redirect users to arbitrary protocol-relative URLs. Successful exploitation permits attackers to craft convincing phishing links that appear to originate from the trusted domain but redirect the victim to an attacker-controlled site. This issue has been patched in version 1.19.0.
References
- https://github.com/QwikDev/qwik/security/advisories/GHSA-92j7-wgmg-f32m x_refsource_CONFIRM
- https://github.com/QwikDev/qwik/commit/9959eab30a3ad9cc03689eaa080fcfbc33df71ed x_refsource_MISC
- https://github.com/QwikDev/qwik/commit/9959eab30a3ad9cc03689eaa080fcfbc33df71ed x_refsource_MISC
- https://github.com/QwikDev/qwik/security/advisories/GHSA-92j7-wgmg-f32m x_refsource_CONFIRM
Affected products
qwik
- ==< 1.19.0