Open Redirect Affecting octoprint package, versions [,1.8.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-OCTOPRINT-6084100
  • published 24 Nov 2023
  • disclosed 1 Oct 2023
  • credit Unknown

Introduced: 1 Oct 2023

CVE NOT AVAILABLE CWE-601 Open this link in a new tab

How to fix?

Upgrade OctoPrint to version 1.8.2 or higher.

Overview

OctoPrint is a snappy web interface for your 3D printer

Affected versions of this package are vulnerable to Open Redirect due to the inadequate checking of the redirect get variable on the login page. This vulnerability could allow an attacker to mislead a user to a harmful domain.

Note: The method used urllib to confirm if the url.scheme and url.netloc are vacant, but this approach does not cover all existing URLs.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.4 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    None