Miggo Logo

CVE-2024-53995:
GHSL-2024-288: SickChill open redirect in login

N/A

CVSS Score

Basic Information

EPSS Score
0.06581%
Published
1/8/2025
Updated
1/8/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
sickchillpip<= 2024.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the LoginHandler's post method in authentication.py, which previously used the 'next_' parameter from the request to determine the redirect location after login. The commit diff shows this parameter was removed in favor of a hardcoded default page. Security advisories and the CVE description explicitly reference this endpoint's handling of the 'next' parameter as the vulnerability source. While the GET method also used the parameter, the primary exploit vector and official fix focused on the POST handler, as demonstrated by the provided PoC and maintainer discussion.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Si*k**ill is *n *utom*ti* vi**o li*r*ry m*n***r *or TV s*ows. * us*r-*ontroll** `lo*in` *n*point's `n*xt_` p*r*m*t*r t*k*s *r*itr*ry *ont*nt. Prior to *ommit ****************************************, *n *ut**nti**t** *tt**k*r m*y us* t*is to r**ir**t

Reasoning

T** vuln*r**ility st*ms *rom t** Lo*in**n*l*r's post m*t*o* in *ut**nti**tion.py, w*i** pr*viously us** t** 'n*xt_' p*r*m*t*r *rom t** r*qu*st to **t*rmin* t** r**ir**t lo**tion **t*r lo*in. T** *ommit *i** s*ows t*is p*r*m*t*r w*s r*mov** in **vor o