CVE-2025-54066

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-54066
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-54066.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-54066
Aliases
Published
2025-07-17T15:15:27Z
Modified
2025-07-18T19:00:38.459288Z
Summary
[none]
Details

DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a redirect field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability.

References

Affected packages

Git / github.com/diracgrid/diracx-web

Affected ranges

Type
GIT
Repo
https://github.com/diracgrid/diracx-web
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0-a1
v0.1.0-a2
v0.1.0-a3
v0.1.0-a4
v0.1.0-a5
v0.1.0-a6
v0.1.0-a7