cve/2024/CVE-2024-7211.md
2025-09-29 21:09:30 +02:00

21 lines
1.1 KiB
Markdown

### [CVE-2024-7211](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7211)
![](https://img.shields.io/static/v1?label=Product&message=1E%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=23.11.1.15%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=23.7.1.80%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=24.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.4.1.229%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brightgreen)
### Description
The 1E Platform's component utilized the third-party Duende Identity Server, which suffered from an open redirect vulnerability, permitting an attacker to control the redirection path of end users.Note: 1E Platform's component utilizing the third-party Duende Identity Server has been updated with the patch that includes the fix.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds