CVE-2023-26494: lorawan-stack Open Redirect vulnerability
lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.
References
- github.com/TheThingsNetwork/lorawan-stack
- github.com/TheThingsNetwork/lorawan-stack/blob/ecdef730f176c02f7c9afce98b0457ae64de5bfc/pkg/webui/account/views/login/index.js
- github.com/TheThingsNetwork/lorawan-stack/blob/ecdef730f176c02f7c9afce98b0457ae64de5bfc/pkg/webui/account/views/token-login/index.js
- github.com/TheThingsNetwork/lorawan-stack/commit/f06776028bdb3994847fc6067613dc61a2b3559e
- github.com/TheThingsNetwork/lorawan-stack/releases/tag/v3.24.1
- github.com/advisories/GHSA-5fwq-9x7j-2qpg
- nvd.nist.gov/vuln/detail/CVE-2023-26494
- securitylab.github.com/advisories
- securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack
Detect and mitigate CVE-2023-26494 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →