Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1834 | Keystone is a content management system for Node.JS. There is an open redirect in the `@keystone-6/auth` package versions 7.0.0 and prior, where the redirect leading `/` filter can be bypassed. Users may be redirected to domains other than the relative host, thereby it might be used by attackers to re-direct users to an unexpected location. To mitigate this issue, one may apply a patch from pull request 8626 or avoid using the `@keystone-6/auth` package. |
Github GHSA |
GHSA-jqxr-vjvv-899m | @keystone-6/auth Open Redirect vulnerability |
Fri, 03 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-03T18:07:02.632Z
Reserved: 2023-05-31T13:51:51.173Z
Link: CVE-2023-34247
Updated: 2024-08-02T16:01:54.349Z
Status : Modified
Published: 2023-06-13T17:15:14.920
Modified: 2024-11-21T08:06:51.397
Link: CVE-2023-34247
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA