Moderate severityNVD Advisory· Published Jun 13, 2023· Updated Jan 3, 2025
@keystone-6/auth Open Redirect vulnerability
CVE-2023-34247
Description
Keystone is a content management system for Node.JS. There is an open redirect in the @keystone-6/auth package versions 7.0.0 and prior, where the redirect leading / filter can be bypassed. Users may be redirected to domains other than the relative host, thereby it might be used by attackers to re-direct users to an unexpected location. To mitigate this issue, one may apply a patch from pull request 8626 or avoid using the @keystone-6/auth package.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@keystone-6/authnpm | < 7.0.0 | 7.0.0 |
Affected products
1- Range: <= 7.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-jqxr-vjvv-899mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-34247ghsaADVISORY
- github.com/keystonejs/keystone/pull/8626ghsax_refsource_MISCWEB
- github.com/keystonejs/keystone/security/advisories/GHSA-jqxr-vjvv-899mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.