cve/2023/CVE-2023-26494.md
2024-06-18 02:51:15 +02:00

18 lines
966 B
Markdown

### [CVE-2023-26494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26494)
![](https://img.shields.io/static/v1?label=Product&message=lorawan-stack&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.24.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brighgreen)
### Description
lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.
### POC
#### Reference
- https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/
#### Github
No PoCs found on GitHub currently.