Skip to content

Open Redirect Vulnerability in Login Page

Low
debanjum published GHSA-564j-v29w-rqr6 Jul 8, 2024

Package

No package listed

Affected versions

<1.14.0

Patched versions

1.14.0

Description

Summary

An attacker can use the next parameter on the login page to redirect a victim to a malicious page, while masking this using a legit-looking app.khoj.dev url.
For example, https://app.khoj.dev/login?next=//example.com will redirect to the https://example.com page.

Details

The problem seems to be in this method:

async def auth(request: Request):

PoC

Open the https://app.khoj.dev/login?next=//example.com url in a Gecko-based browser (Firefox).

Impact

The impact is low, and this could only be used in phishing attempts, but it's still a problem nonetheless.

Severity

Low

CVE ID

No known CVE

Weaknesses

Credits