DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 17 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability. | |
Title | DiracX-Web login page has Open Redirect vulnerability | |
Weaknesses | CWE-601 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-17T14:44:27.982Z
Updated: 2025-07-17T20:03:49.445Z
Reserved: 2025-07-16T13:22:18.204Z
Link: CVE-2025-54066

Updated: 2025-07-17T20:03:26.949Z

Status : Awaiting Analysis
Published: 2025-07-17T15:15:27.873
Modified: 2025-07-17T21:15:50.197
Link: CVE-2025-54066

No data.