CVE-2024-43794

6.1 MEDIUM

📋 TL;DR

OpenSearch Dashboards Security Plugin versions before 1.3.19 and 2.16.0 have an open redirect vulnerability in the login flow. Attackers can craft malicious URLs that redirect users to external sites after authentication, potentially enabling phishing attacks or credential theft. This affects all OpenSearch Dashboards deployments using the Security Plugin.

💻 Affected Systems

Products:
  • OpenSearch Dashboards Security Plugin
Versions: All versions before 1.3.19 and 2.16.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the Security Plugin. The vulnerability is in the login flow's nextUrl parameter validation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to malicious phishing sites after successful authentication, leading to credential theft, session hijacking, or malware installation.

🟠

Likely Case

Attackers use crafted links to redirect authenticated users to phishing pages, potentially harvesting credentials or session tokens.

🟢

If Mitigated

With proper network segmentation and user awareness, impact is limited to potential phishing attempts that users may recognize.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking a crafted link) and authentication. The vulnerability is in the redirect logic after successful login.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.19 or 2.16.0

Vendor Advisory: https://github.com/opensearch-project/security-dashboards-plugin/security/advisories/GHSA-3fph-6cqp-5mfc

Restart Required: Yes

Instructions:

1. Update OpenSearch Dashboards to version 1.3.19 or 2.16.0. 2. Restart the OpenSearch Dashboards service. 3. Verify the Security Plugin version matches the patched version.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to OpenSearch Dashboards to trusted networks only

User Awareness Training

all

Train users to verify URLs before entering credentials and avoid clicking suspicious links

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to OpenSearch Dashboards
  • Deploy web application firewall (WAF) rules to detect and block open redirect attempts

🔍 How to Verify

Check if Vulnerable:

Check the OpenSearch Dashboards Security Plugin version. If it's below 1.3.19 (for 1.x) or 2.16.0 (for 2.x), the system is vulnerable.

Check Version:

curl -XGET 'http://localhost:5601/api/status' | grep -i version

Verify Fix Applied:

After patching, verify the Security Plugin version shows 1.3.19 or 2.16.0 in the OpenSearch Dashboards interface or via API.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in authentication logs
  • Login attempts with suspicious nextUrl parameters

Network Indicators:

  • HTTP 302 redirects to external domains after successful authentication

SIEM Query:

event.category:web AND event.action:redirect AND url.original:*nextUrl=* AND NOT url.original:*nextUrl=/dashboard*

🔗 References

📤 Share & Export