Description
This issue occurs when handling HTTP 'Location:' redirect requests. The software fails to verify target protocols used in an automatic redirect request. An attacker running a malicious server could redirect a URI request and use a URI handler such as 'file://' to obtain files from a vulnerable computer.
Remediation
The web application should not permit redirects from http:// to file://.
Related Vulnerabilities
WordPress Improper Input Validation Vulnerability (CVE-2011-3127)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2013-0156)
Java Debug Wire Protocol remote code execution
Python Improper Input Validation Vulnerability (CVE-2023-27043)
IBMHttpServer Improper Input Validation Vulnerability (CVE-2023-26281)