All versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection.
References
| Link | Resource |
|---|---|
| https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ | Mitigation Third Party Advisory |
| https://github.com/greenpau/caddy-security/issues/268 | Issue Tracking |
| https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861 | Third Party Advisory |
| https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ | Mitigation Third Party Advisory |
| https://github.com/greenpau/caddy-security/issues/268 | Issue Tracking |
| https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-17 05:15
Updated : 2025-02-26 21:40
NVD link : CVE-2024-21497
Mitre link : CVE-2024-21497
CVE.ORG link : CVE-2024-21497
JSON object : View
Products Affected
greenpau
- caddy-security
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
