CVE-2024-21641

Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*

History

17 Jan 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.5

21 Nov 2024, 08:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.7
v2 : unknown
v3 : 7.5
References () https://github.com/flarum/flarum-core/commit/ee8b3b4ad1413a2b0971fdd9e40f812d2a3a9d3a - Patch () https://github.com/flarum/flarum-core/commit/ee8b3b4ad1413a2b0971fdd9e40f812d2a3a9d3a - Patch
References () https://github.com/flarum/framework/commit/7d70328471cf3091d92d95c382d277aec7996176 - Patch () https://github.com/flarum/framework/commit/7d70328471cf3091d92d95c382d277aec7996176 - Patch
References () https://github.com/flarum/framework/security/advisories/GHSA-733r-8xcp-w9mr - Patch, Vendor Advisory () https://github.com/flarum/framework/security/advisories/GHSA-733r-8xcp-w9mr - Patch, Vendor Advisory

18 Jan 2024, 20:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 4.7
CPE cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*
Summary
  • (es) Flarum es un software de plataforma de discusión de código abierto. Antes de la versión 1.8.5, la ruta `/logout` de Flarum incluye un parámetro de redirección que permite a cualquier tercero redirigir a los usuarios desde un dominio (confiable) de la instalación de Flarum para redirigir a cualquier enlace. Para los usuarios que han iniciado sesión, se debe confirmar el cierre de sesión. Los invitados son redirigidos inmediatamente. Los spammers podrían utilizar esto para redirigir a una dirección web utilizando un dominio confiable de una instalación de Flarum en ejecución. La vulnerabilidad ha sido reparada y publicada como flarum/core v1.8.5. Como workaround, algunas extensiones que modifican la ruta de cierre de sesión pueden solucionar este problema si su implementación es segura.
First Time Flarum flarum
Flarum
References () https://github.com/flarum/flarum-core/commit/ee8b3b4ad1413a2b0971fdd9e40f812d2a3a9d3a - () https://github.com/flarum/flarum-core/commit/ee8b3b4ad1413a2b0971fdd9e40f812d2a3a9d3a - Patch
References () https://github.com/flarum/framework/commit/7d70328471cf3091d92d95c382d277aec7996176 - () https://github.com/flarum/framework/commit/7d70328471cf3091d92d95c382d277aec7996176 - Patch
References () https://github.com/flarum/framework/security/advisories/GHSA-733r-8xcp-w9mr - () https://github.com/flarum/framework/security/advisories/GHSA-733r-8xcp-w9mr - Patch, Vendor Advisory

05 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-05 21:15

Updated : 2025-01-17 19:15


NVD link : CVE-2024-21641

Mitre link : CVE-2024-21641

CVE.ORG link : CVE-2024-21641


JSON object : View

Products Affected

flarum

  • flarum
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')