Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hfj7-542q-8fvv

Опубликовано: 17 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.7

Описание

DiracX-Web is vulnerable to attack through an Open Redirect on its login page

Summary

An attacker can forge a request to redirect an authenticated user to any arbitrary website.

Details

On the login page, we have a redirect field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI.

Paired with a parameter pollution, we can hide our malicious URI (ex: https://dns.com/?param1=im_hidden_if_theres_lot_of_args?param1=bbb).

PoC

https://diracx-cert.app.cern.ch/auth?redirect=https://ipcim.com/en/where/?dsdsd=qsqsfsjfnsfniizaeiaapzqlalkqkaizqqijsjaopmqmxna?redirect=https://diracx-cert-app.cern.ch/auth

This POC can leak user's position.

Impact

This could be used for phishing and extracting new data (such as redirecting to a new "log in" page, and asking users to reenter credentials).

Пакеты

Наименование

@dirac-grid/diracx-web-components

npm
Затронутые версииВерсия исправления

< 0.1.0-a8

0.1.0-a8

EPSS

Процентиль: 8%
0.00031
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 4.7
nvd
7 месяцев назад

DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability.

EPSS

Процентиль: 8%
0.00031
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-601