CVE-2024-41955: MobSF vulnerable to Open Redirect in Login Redirect
5.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.87244%
CWE
Published
7/31/2024
Updated
8/2/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
mobsf | pip | < 4.0.5 | 4.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper validation
of user-controlled redirect URLs. The commit introduced a 'sanitize_redirect' function
to address this, replacing the original checks in these three functions
. The pre-patch code in authentication.py
and saml2.py
used 'startswith('/')' validation
, which allowed '//attacker.com' URLs (valid under the check but unsafe). The functions
handling redirect logic were directly modified in the fix, confirming their role in the vulnerability.