Miggo Logo

CVE-2024-41955: MobSF vulnerable to Open Redirect in Login Redirect

5.2

CVSS Score
3.1

Basic Information

EPSS Score
0.87244%
Published
7/31/2024
Updated
8/2/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
mobsfpip< 4.0.54.0.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper validation of user-controlled redirect URLs. The commit introduced a 'sanitize_redirect' function to address this, replacing the original checks in these three functions. The pre-patch code in authentication.py and saml2.py used 'startswith('/')' validation, which allowed '//attacker.com' URLs (valid under the check but unsafe). The functions handling redirect logic were directly modified in the fix, confirming their role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ *n op*n r**ir**t vuln*r**ility *xist in Mo*S* *ut**nti**tion vi*w. Po* *. *o to *ttp://***.*.*.*:****/lo*in/?n*xt=//**in*.*om in * w** *rows*r. *. *nt*r *r***nti*ls *n* pr*ss "Si*n In

Reasoning

T** vuln*r**ility st*mm** *rom improp*r `v*li**tion` o* us*r-*ontroll** r**ir**t URLs. T** *ommit intro*u*** * 's*nitiz*_r**ir**t' `*un*tion` to ***r*ss t*is, r*pl**in* t** ori*in*l ****ks in t**s* t*r** `*un*tions`. T** pr*-p*t** *o** in `*ut**nti**