Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.
References
Configurations
History
18 Jan 2024, 20:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/flarum/flarum-core/commit/ee8b3b4ad1413a2b0971fdd9e40f812d2a3a9d3a - Patch | |
References | () https://github.com/flarum/framework/commit/7d70328471cf3091d92d95c382d277aec7996176 - Patch | |
References | () https://github.com/flarum/framework/security/advisories/GHSA-733r-8xcp-w9mr - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
CPE | cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:* |
05 Jan 2024, 22:12
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-05 21:15
Updated : 2024-02-05 00:22
NVD link : CVE-2024-21641
Mitre link : CVE-2024-21641
CVE.ORG link : CVE-2024-21641
JSON object : View
Products Affected
flarum
- flarum
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')