Miggo Logo

CVE-2024-34071:
Umbraco CMS Open Redirect Bypass Protection

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.58963%
Published
5/21/2024
Updated
5/21/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
UmbracoCms.Corenuget>= 8.18.5, < 8.18.148.18.14
UmbracoCms.Corenuget>= 10.5.0, < 10.8.610.8.6
UmbracoCms.Corenuget>= 12.0.0, < 12.3.1012.3.10
UmbracoCms.Corenuget>= 13.0.0, < 13.3.113.3.1
Umbraco.Cms.Web.BackOfficenuget>= 8.18.5, < 8.18.148.18.14
Umbraco.Cms.Web.BackOfficenuget>= 10.5.0, < 10.8.610.8.6
Umbraco.Cms.Web.BackOfficenuget>= 12.0.0, < 12.3.1012.3.10
Umbraco.Cms.Web.BackOfficenuget>= 13.0.0, < 13.3.113.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper validation of redirect URLs. The original implementations used Uri.IsWellFormedUriString, which considers protocol-relative URLs (e.g., '//evil.com') as valid relative URIs. Attackers could exploit this to create open redirects. The patches introduced WebPath.IsWellFormedWebPath, which explicitly rejects protocol-relative URLs when validating relative paths. The affected functions were in ImagesController (IsAllowed) and PreviewController (End), where the flawed validation occurred.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Um*r**o **v* *n *n*point t**t is vuln*r**l* to op*n r**ir**ts. T** *n*point is prot**t** so it r*quir*s t** us*r to ** si*n** into ***ko**i**, ***or* t** vuln*r**ility is *xpos**. ### *****t** V*rsion \>= *.**.*, >= **.*.*, >= **.*.*, >=

Reasoning

T** vuln*r**ility st*mm** *rom improp*r v*li**tion o* r**ir**t URLs. T** ori*in*l impl*m*nt*tions us** `Uri.IsW*ll*orm**UriStrin*`, w*i** *onsi**rs proto*ol-r*l*tiv* URLs (*.*., '//*vil.*om') *s v*li* r*l*tiv* URIs. *tt**k*rs *oul* *xploit t*is to *r