Miggo Logo

CVE-2021-32645:
Open Redirect

4.3

CVSS Score
3.0

Basic Information

EPSS Score
0.51698%
Published
3/18/2022
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
hyn/multi-tenantcomposer>= 5.6.0, < 5.7.25.7.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the insecure handling of request URIs in the HTTPS redirection logic. The commit 9c837a2 shows the fix involved adding ltrim($request->getRequestUri(), '/') to remove leading slashes before processing. This indicates the original implementation in HostnameActions::secure used $request->getRequestUri() directly without sanitization, allowing crafted URIs to bypass validation and create open redirects when combined with force_https=true. The middleware's role in handling hostname-related redirects makes this the logical location for the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t In som* situ*tions, it is possi*l* to **v* op*n r**ir**ts w**r* us*rs **n ** r**ir**t** *rom your sit* to *ny ot**r sit* usin* * sp**i*lly *r**t** URL. T*is is only t** **s* *or inst*ll*tions w**r* t** ****ult *ostn*m* I**nti*i**tion is us

Reasoning

T** vuln*r**ility st*ms *rom t** ins**ur* **n*lin* o* r*qu*st URIs in t** *TTPS r**ir**tion lo*i*. T** *ommit ******* s*ows t** *ix involv** ***in* `ltrim($r*qu*st->**tR*qu*stUri(), '/')` to r*mov* l***in* sl*s**s ***or* pro**ssin*. T*is in*i**t*s t*