CVE-2025-54066

4.7 MEDIUM

📋 TL;DR

This vulnerability in DiracX-Web allows attackers to redirect authenticated users to malicious websites through an unvalidated redirect parameter. Attackers can exploit parameter pollution to hide malicious URLs, potentially leading to phishing attacks and credential theft. All users of DiracX-Web versions before 0.1.0-a8 are affected.

💻 Affected Systems

Products:
  • DiracX-Web
Versions: All versions prior to 0.1.0-a8
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the login page redirect functionality and affects all deployments using vulnerable versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers successfully phish user credentials, gain unauthorized access to sensitive systems, and potentially compromise the entire DiracX infrastructure.

🟠

Likely Case

Users are redirected to phishing sites that steal credentials, leading to unauthorized access to individual accounts and potential data exposure.

🟢

If Mitigated

Users are redirected to suspicious URLs but security training and multi-factor authentication prevent successful credential theft.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to craft a malicious URL and trick an authenticated user into clicking it. Parameter pollution techniques make detection more difficult.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.0-a8

Vendor Advisory: https://github.com/DIRACGrid/diracx-web/security/advisories/GHSA-hfj7-542q-8fvv

Restart Required: Yes

Instructions:

1. Update DiracX-Web to version 0.1.0-a8 or later. 2. Restart the DiracX-Web service. 3. Verify the fix by testing redirect functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to only allow redirects to trusted domains

Implement redirect URL validation in application code to check domain whitelist

WAF Rule

all

Configure web application firewall to block requests with suspicious redirect parameters

Add WAF rule to detect and block requests with external URLs in redirect parameter

🧯 If You Can't Patch

  • Implement strict input validation for all redirect parameters to only allow internal URLs
  • Deploy web application firewall with rules to detect and block open redirect attempts

🔍 How to Verify

Check if Vulnerable:

Test if the login page accepts external URLs in the redirect parameter without validation

Check Version:

Check DiracX-Web version in application interface or configuration files

Verify Fix Applied:

Attempt to use external URLs in the redirect parameter and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with external domains in redirect parameter
  • Multiple failed login attempts followed by redirects to unusual domains

Network Indicators:

  • Outbound connections to suspicious domains following login requests
  • Unusual redirect patterns in HTTP traffic

SIEM Query:

source="diracx-web" AND (url:*redirect=*http* OR url:*redirect=*https*) AND NOT url:*redirect=*trusted-domain*

🔗 References

📤 Share & Export