Loading HuntDB...

GHSA-hfj7-542q-8fvv

GitHub Security Advisory

DiracX-Web is vulnerable to attack through an Open Redirect on its login page

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Summary

An attacker can forge a request to redirect an authenticated user to any arbitrary website.

### Details

On the login page, we have a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI.

Paired with a parameter pollution, we can hide our malicious URI (ex: `https://dns.com/?param1=im_hidden_if_theres_lot_of_args?param1=bbb`).

### PoC

https://diracx-cert.app.cern.ch/auth?redirect=https://ipcim.com/en/where/?dsdsd=qsqsfsjfnsfniizaeiaapzqlalkqkaizqqijsjaopmqmxna?redirect=https://diracx-cert-app.cern.ch/auth

This POC can leak user's position.

### Impact

This could be used for phishing and extracting new data (such as redirecting to a new "log in" page, and asking users to reenter credentials).

Affected Packages

npm @dirac-grid/diracx-web-components
Affected versions: 0 (fixed in 0.1.0-a8)

Related CVEs

Key Information

GHSA ID
GHSA-hfj7-542q-8fvv
Published
July 17, 2025 7:40 PM
Last Modified
July 17, 2025 7:40 PM
CVSS Score
5.0 /10
Primary Ecosystem
npm
Primary Package
@dirac-grid/diracx-web-components
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 26, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.