CVE-2024-39694: IdentityServer Open Redirect vulnerability
4.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21103%
CWE
Published
7/31/2024
Updated
7/31/2024
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Duende.IdentityServer | nuget | >= 7.0.0-preview.1, <= 7.0.5 | 7.0.6 |
Duende.IdentityServer | nuget | >= 6.3.0-preview.1, <= 6.3.9 | 6.3.10 |
Duende.IdentityServer | nuget | >= 6.2.0-preview.1, <= 6.2.4 | 6.2.5 |
Duende.IdentityServer | nuget | >= 6.1.0-preview.1, <= 6.1.7 | 6.1.8 |
Duende.IdentityServer | nuget | >= 6.0.0-preview.1, <= 6.0.4 | 6.0.5 |
IdentityServer4 | nuget | <= 4.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper URL validation in the IsLocalUrl
method implementations, which failed to detect control characters in URLs. This flaw propagated to multiple security-critical methods that relied on this validation, including authorization context handling and return URL parsing. The commit diffs show explicit fixes adding control character checks, and test cases demonstrate how malicious URLs with tabs/newlines would previously pass validation. The affected methods listed in advisory documentation (GetAuthorizationContextAsync
, IsValidReturnUrl
, etc.) all depend on this flawed validation logic.