CVE-2019-11016:
Elgg open redirect
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47936%
CWE
Published
5/14/2022
Updated
9/28/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
elgg/elgg | composer | < 1.12.18 | 1.12.18 |
elgg/elgg | composer | >= 2.3.0, < 2.3.11 | 2.3.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The key evidence comes from the 2.3.11 patch notes mentioning 'more consistency in resource gatekeepers' (commit 60a045a3). Open redirects typically occur when redirect parameters (e.g., return_to, next) are not properly validated. The gatekeeper component likely handled access control checks and redirects, but allowed arbitrary URLs in redirect parameters. While the exact function isn't specified in available data, the gatekeeper's role in resource access and the patch's focus on consistency strongly suggest this component contained the vulnerable logic. Confidence is medium due to reliance on patch descriptions without direct code analysis.