Lucene search

K
cve[email protected]CVE-2023-26494
HistoryApr 24, 2023 - 5:15 p.m.

CVE-2023-26494

2023-04-2417:15:10
CWE-601
web.nvd.nist.gov
59
cve-2023-26494
lorawan-stack
open redirect
phishing
network server
cve

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

47.9%

lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.

Affected configurations

Vulners
NVD
Node
thethingsnetworklorawan-stackRange<3.24.1
VendorProductVersionCPE
thethingsnetworklorawan\-stack*cpe:2.3:a:thethingsnetwork:lorawan\-stack:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "TheThingsNetwork",
    "product": "lorawan-stack",
    "versions": [
      {
        "version": "< 3.24.1",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

47.9%

Related for CVE-2023-26494