Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39097: n/a

0
Medium
VulnerabilityCVE-2024-39097cvecve-2024-39097
Published: Mon Aug 26 2024 (08/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:17:57 UTC

Technical Analysis

CVE-2024-39097 identifies an Open Redirect vulnerability in Gnuboard, an open-source web content management system widely used in certain regions for building community and bulletin board websites. The vulnerability is triggered via the 'url' parameter in the login path, which improperly validates or sanitizes user-supplied input. This allows an attacker to craft a malicious URL that, when clicked by a user, redirects them to an arbitrary external website controlled by the attacker. Such redirects can be leveraged in phishing campaigns to trick users into divulging credentials or downloading malware, or to bypass security controls that rely on URL origin checks. The vulnerability does not require authentication but does require user interaction (clicking the malicious link). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low confidentiality and integrity impacts with no availability impact. No patches or fixes have been linked yet, and no active exploitation has been reported. The CWE-601 classification confirms this is a classic Open Redirect issue, a common web application security flaw.

Potential Impact

For European organizations, the primary risk is that attackers can exploit this vulnerability to conduct phishing or social engineering attacks by redirecting users from legitimate Gnuboard login pages to malicious sites. This can lead to credential theft, session hijacking, or malware infections, undermining user trust and potentially exposing sensitive information. Organizations relying on Gnuboard for community engagement or internal communications may see reputational damage and increased risk of targeted attacks. Since the vulnerability affects the login path, it could facilitate more effective phishing by mimicking legitimate authentication flows. The medium CVSS score reflects moderate risk, but the actual impact depends on the extent of Gnuboard deployment and user awareness. No direct system compromise or denial of service is indicated, but the indirect consequences can be significant, especially in sectors with sensitive data or regulatory compliance requirements such as GDPR.

Mitigation Recommendations

Organizations should immediately review their Gnuboard installations and upgrade to a patched version once available. In the absence of an official patch, administrators can implement input validation and sanitization on the 'url' parameter to ensure only trusted internal URLs are accepted. Employing a whitelist approach for redirect URLs or removing the redirect functionality from the login path can mitigate exploitation. Additionally, organizations should educate users about the risks of clicking suspicious links and implement multi-factor authentication to reduce the impact of credential theft. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns targeting the vulnerable parameter. Monitoring web logs for unusual redirect attempts and conducting phishing awareness campaigns will further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903f7a3aebfcd5474a44745

Added to database: 10/30/2025, 11:41:23 PM

Last enriched: 1/26/2026, 7:17:57 PM

Last updated: 2/6/2026, 9:07:30 PM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats