We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability.
Reserved 2025-07-16 | Published 2025-07-17 | Updated 2025-07-17 | Assigner GitHub_MCWE-601: URL Redirection to Untrusted Site ('Open Redirect')
github.com/...cx-web/security/advisories/GHSA-hfj7-542q-8fvv
github.com/...ommit/eba3b7bc4f9d394074215986e6d3c15b546b25d5
diracx-cert.app.cern.ch/...ps://diracx-cert-app.cern.ch/auth
Support options