Description
This issue occurs when handling HTTP 'Location:' redirect requests. The software fails to verify target protocols used in an automatic redirect request. An attacker running a malicious server could redirect a URI request and use a URI handler such as 'file://' to obtain files from a vulnerable computer.
Remediation
The web application should not permit redirects from http:// to file://.
References
Related Vulnerabilities
Joomla Improper Input Validation Vulnerability (CVE-2018-11321)
WordPress Plugin Export Users to CSV CSV Injection (1.1.1)
Jboss EAP Improper Input Validation Vulnerability (CVE-2020-10693)
PHP Improper Input Validation Vulnerability (CVE-2015-4604)
Drupal Core 4.7.x Form Action Attribute Injection (4.7.0 - 4.7.3)