Vulnerability Description
Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.
CVSS Score
6.1
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Posthog | Posthog | < 1.34.1 |
Related Weaknesses (CWE)
References
- https://github.com/posthog/posthog/commit/859d8ed9ac7c5026db09714a26c85c1458abb0PatchThird Party Advisory
- https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6ExploitThird Party Advisory
- https://github.com/posthog/posthog/commit/859d8ed9ac7c5026db09714a26c85c1458abb0PatchThird Party Advisory
- https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6ExploitThird Party Advisory
FAQ
What is CVE-2022-0645?
CVE-2022-0645 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.
How severe is CVE-2022-0645?
CVE-2022-0645 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0645?
Check the references section above for vendor advisories and patch information. Affected products include: Posthog Posthog.