Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backslash bypass)
Vulnerability Description
Saltcorn is an extensible, open source, no-code database application builder. Prior to versions 1.4.6, 1.5.6, and 1.6.0-beta.5, Saltcorn validates the post-login dest parameter with a string check that only blocks :/ and //. Because all WHATWG-compliant browsers normalise backslashes (\) to forward slashes (/) for special schemes, a payload such as /\evil.com/path slips through is_relative_url(), is emitted unchanged in the HTTP Location header, and causes the browser to navigate cross-origin to an attacker-controlled domain. The bug is reachable on a default install and only requires a victim who can be tricked into logging in via a crafted Saltcorn URL. This issue has been patched in versions 1.4.6, 1.5.6, and 1.6.0-beta.5.
CVSS Information
N/A
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Vulnerability Title
Saltcorn 输入验证错误漏洞
Vulnerability Description
Saltcorn是Saltcorn开源的一个可扩展的开源无代码数据库应用程序构建器。 Saltcorn 1.4.6之前版本、1.5.6之前版本和1.6.0-beta.5之前版本存在输入验证错误漏洞,该漏洞源于登录后dest参数验证仅阻止:/和//,但WHATWG兼容浏览器将反斜杠规范化为正斜杠,可能导致跨域重定向到攻击者控制的域名。
CVSS Information
N/A
Vulnerability Type
N/A