Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6 | third party advisory exploit |
https://github.com/posthog/posthog/commit/859d8ed9ac7c5026db09714a26c85c1458abb038 | third party advisory patch |