Miggo Logo

CVE-2023-34247:
@keystone-6/auth Open Redirect vulnerability

6.1

CVSS Score

Basic Information

EPSS Score
-
Published
6/14/2023
Updated
11/4/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
@keystone-6/authnpm< 7.0.07.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability was explicitly addressed by removing redirect functionality in PR #8626. The commit messages and PR title indicate the redirect logic in authentication flows was the attack surface. Open redirect vulnerabilities typically involve improper validation of URL parameters in redirection handlers, which aligns with the CWE-601 description and the mitigation strategy of removing the feature entirely.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T**r* is *n op*n r**ir**t in t** `@k*yston*-*/*ut*` p**k***, w**r* t** r**ir**t l***in* `/` *ilt*r **n ** *yp*ss**. ### Imp**t Us*rs m*y ** r**ir**t** to *om*ins ot**r t**n t** r*l*tiv* *ost, t**r**y it mi**t ** us** *y *tt**k*rs to r*-*

Reasoning

T** vuln*r**ility w*s *xpli*itly ***r*ss** *y r*movin* r**ir**t *un*tion*lity in PR #****. T** *ommit m*ss***s *n* PR titl* in*i**t* t** r**ir**t lo*i* in *ut**nti**tion *lows w*s t** *tt**k sur****. Op*n r**ir**t vuln*r**iliti*s typi**lly involv* im