lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.
References
Configurations
History
21 Nov 2024, 07:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TheThingsNetwork/lorawan-stack/blob/ecdef730f176c02f7c9afce98b0457ae64de5bfc/pkg/webui/account/views/login/index.js#L90-L90 - Product | |
References | () https://github.com/TheThingsNetwork/lorawan-stack/blob/ecdef730f176c02f7c9afce98b0457ae64de5bfc/pkg/webui/account/views/token-login/index.js#L74-L74 - Product | |
References | () https://github.com/TheThingsNetwork/lorawan-stack/commit/f06776028bdb3994847fc6067613dc61a2b3559e - Patch | |
References | () https://github.com/TheThingsNetwork/lorawan-stack/releases/tag/v3.24.1 - Release Notes | |
References | () https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/ - Exploit, Third Party Advisory |
Information
Published : 2023-04-24 17:15
Updated : 2024-11-21 07:51
NVD link : CVE-2023-26494
Mitre link : CVE-2023-26494
CVE.ORG link : CVE-2023-26494
JSON object : View
Products Affected
thethingsnetwork
- lorawan-stack
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')