CVE-2024-57241
Published: 11 February 2025
Summary
CVE-2024-57241 is a medium-severity Open Redirect (CWE-601) vulnerability in Dedecms Dedecms. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked in the top 3.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the logic error by requiring validation of untrusted GET request inputs used for URL redirection.
Prevents arbitrary redirects by filtering output Location headers to approved destinations only.
Addresses the vulnerability through identification, reporting, and correction of the specific flaw in Dedecms.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Open URL redirection vulnerability enables attackers to craft deceptive links on the vulnerable Dedecms site that redirect users to arbitrary malicious domains, facilitating spearphishing link attacks (T1566.002).
NVD Description
Dedecms 5.71sp1 and earlier is vulnerable to URL redirect. In the web application, a logic error does not judge the input GET request resulting in URL redirection.
Deeper analysisAI
CVE-2024-57241 is an open redirect vulnerability (CWE-601) affecting Dedecms versions 5.71sp1 and earlier. The flaw arises from a logic error in the web application that fails to validate input from GET requests, enabling arbitrary URL redirection.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Per the CVSS 3.1 score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N), exploitation leads to low impacts on confidentiality and integrity, with no availability disruption, typically allowing attackers to redirect users to malicious sites for phishing or similar follow-on attacks.
A reference implementation or proof-of-concept for the vulnerability is available at https://github.com/woshidaheike/dedecms-url-redirection.
Details
- CWE(s)