Skip to content

Open redirect in @keystone-6/auth

Low
dcousens published GHSA-jqxr-vjvv-899m Jun 13, 2023

Package

npm @keystone-6/auth (npm)

Affected versions

<7.0.0,7.0.0

Patched versions

>=7.0.1

Description

Summary

There is an open redirect in the @keystone-6/auth package, where the redirect leading / filter can be bypassed.

Impact

Users may be redirected to domains other than the relative host, thereby it might be used by attackers to re-direct users to an unexpected location.

Mitigations

  • Don't use the @keystone-6/auth package

References

Similar Vulnerability Reports

Credits

Thanks to morioka12 for reporting this problem.

If you have any questions around this security advisory, please don't hesitate to contact us at [email protected], or open an issue on GitHub.

If you have a security flaw to report for any software in this repository, please see our SECURITY policy.

Severity

Low
0.0
/ 10

CVSS base metrics

Attack vector
Adjacent
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
None
Integrity
None
Availability
None
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:N

CVE ID

CVE-2023-34247

Weaknesses

Credits