CVE-2024-11044

6.1 MEDIUM

📋 TL;DR

An open redirect vulnerability in automatic1111/stable-diffusion-webui version 1.10.0 allows attackers to redirect users to malicious websites via crafted URLs. This affects all users running the vulnerable version of the web interface. The vulnerability enables phishing, malware distribution, and credential theft attacks.

💻 Affected Systems

Products:
  • automatic1111/stable-diffusion-webui
Versions: 1.10.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the web interface component; the underlying stable-diffusion model is not directly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials, install malware, or compromise their systems, leading to account takeover, data theft, or ransomware infection.

🟠

Likely Case

Attackers use the vulnerability for phishing campaigns to steal user credentials or distribute adware/malware through malicious redirects.

🟢

If Mitigated

With proper user awareness and browser security controls, users might recognize suspicious redirects, limiting successful attacks to less sophisticated targets.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking malicious links but is technically simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.10.1 or later

Vendor Advisory: https://github.com/AUTOMATIC1111/stable-diffusion-webui/security/advisories

Restart Required: Yes

Instructions:

1. Backup your configuration and models. 2. Update to version 1.10.1 or later using git pull or download the latest release. 3. Restart the webui service.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to reject URLs with external domains in redirect parameters.

Modify webui.py to validate redirect URLs against an allowlist before processing.

Reverse Proxy Filtering

linux

Configure reverse proxy (nginx/apache) to block requests with suspicious redirect parameters.

Add location block in nginx to deny requests containing 'redirect=' with external domains.

🧯 If You Can't Patch

  • Restrict access to the webui to trusted networks only using firewall rules.
  • Implement client-side browser extensions that warn about open redirects.

🔍 How to Verify

Check if Vulnerable:

Check if running version 1.10.0 by examining the webui interface or version file.

Check Version:

grep 'version' webui.py or check the web interface footer.

Verify Fix Applied:

After updating, confirm version is 1.10.1+ and test that redirects to external domains are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with 'redirect=' parameter containing external domains
  • Unusual redirect patterns in access logs

Network Indicators:

  • Outbound connections to unexpected domains following redirects
  • Increased traffic to known phishing domains

SIEM Query:

source="webui_access.log" AND "redirect=" AND NOT "redirect=localhost"

🔗 References

📤 Share & Export