CVE-2024-21497

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to trick users into visiting a malicious website by manipulating a URL with a specific parameter. To exploit it, the user must click on a button or use the back button, which triggers the redirect to the harmful site.

Technical Description

Versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$862($500-$1K)
Vendor Response
Grade FPatched in 745 days

Quick Information

Published

Feb 17, 2024

about 2 years ago

Last Modified

Mar 3, 2026

about 1 month ago

Vendor

greenpau

Product

caddy-security