-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mobsf | pip | < 4.0.5 | 4.0.5 |
The vulnerability stemmed from improper validation of user-controlled redirect URLs. The commit introduced a 'sanitize_redirect' function to address this, replacing the original checks in these three functions. The pre-patch code in authentication.py and saml2.py used 'startswith('/')' validation, which allowed '//attacker.com' URLs (valid under the check but unsafe). The functions handling redirect logic were directly modified in the fix, confirming their role in the vulnerability.