Open Redirect Affecting cryptoadvance.specter package, versions [,2.0.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-CRYPTOADVANCESPECTER-6840403
  • published 14 May 2024
  • disclosed 1 May 2024
  • credit zealsham

Introduced: 1 May 2024

CVE NOT AVAILABLE CWE-601 Open this link in a new tab

How to fix?

Upgrade cryptoadvance.specter to version 2.0.2 or higher.

Overview

cryptoadvance.specter is an A GUI for Bitcoin Core & Electrum optimised to work with airgapped hardware wallets

Affected versions of this package are vulnerable to Open Redirect where the "next" parameter during the login process on Specter desktop can be manipulated to redirect users to an unauthorized domain after login. This vulnerability poses a phishing risk, as attackers can easily direct users to malicious sites by altering the "next" parameter in the URL.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.4 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    None