This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
**π¨ Open Redirect Vulnerability** in `doorman/users/views.py`'s `is_safe_url` function. 𧨠Attackers can redirect users to malicious sites via `Next` parameter.β¦
**β οΈ Affected: doorman project (β€ v0.6)**. π¦ Component: `users/views.py` in mwielgoszewski's doorman. π¦ All versions up to 0.6 are vulnerable.
Q4What can hackers do? (Privileges/Data)
**π Hackers can redirect users** to any external site. π― No data theft or privilege escalation. π― Goal: Trick users into visiting phishing pages or fake login forms.
**β Public PoC exists**. π Gist link: [https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924](https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924). π Exploitation likely in wild.
Q7How to self-check? (Features/Scanning)
**π Self-check**: π Look for `is_safe_url` in `views.py`. π§ͺ Test with `?next=https://evil.com`. π Use web scanners (e.g., OWASP ZAP) to detect open redirects.
Q8Is it fixed officially? (Patch/Mitigation)
**π οΈ No official patch mentioned**. π Latest commit (9a9b97c8) still vulnerable. π’ Patch not released as of 2026-02-08. π¨ No mitigation details in data.
**β οΈ Medium-Urgent**. π CVSS: 5.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N). π¨ Not critical, but high-risk for phishing. π Patch ASAP if possible.