Description
This issue occurs when handling HTTP 'Location:' redirect requests. The software fails to verify target protocols used in an automatic redirect request. An attacker running a malicious server could redirect a URI request and use a URI handler such as 'file://' to obtain files from a vulnerable computer.
Remediation
The web application should not permit redirects from http:// to file://.
References
Related Vulnerabilities
Squid Improper Input Validation Vulnerability (CVE-2012-5643)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2011-3187)
Same origin method execution (SOME)
WordPress Plugin LISL Last-Image Slider TimThumb Arbitrary File Upload (1.0)
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000391)