CVE-2021-32645:
Open Redirect
4.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.51698%
CWE
Published
3/18/2022
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
hyn/multi-tenant | composer | >= 5.6.0, < 5.7.2 | 5.7.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the insecure handling of request URIs in the HTTPS redirection logic. The commit 9c837a2 shows the fix involved adding ltrim($request->getRequestUri(), '/')
to remove leading slashes before processing. This indicates the original implementation in HostnameActions::secure
used $request->getRequestUri()
directly without sanitization, allowing crafted URIs to bypass validation and create open redirects when combined with force_https=true
. The middleware's role in handling hostname-related redirects makes this the logical location for the vulnerability.