CVE-2017-7266:
Netflix Security Monkey Open Redirect vulnerability
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47647%
CWE
Published
5/17/2022
Updated
4/8/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
security_monkey | pip | < 0.8.0 | 0.8.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the 'next' parameter in the logout functionality. While the explicit vulnerable code isn't shown in the provided diffs, the commit message explicitly references replacing Flask-Security
with Flask-Security-Fork
to address logout redirection vulnerabilities. The Logout.get()
method in Security Monkey's codebase was the entry point for this functionality, and the dependency update (Flask-Security-Fork
) contained the fix for the open redirect. This indicates the logout handler in Security Monkey's code relied on vulnerable dependency logic to process redirects.