Impact
The vulnerability is an open redirect in the redirectToLogin function of the Host Header Handler. Manipulating the Host header can cause the application to redirect users to arbitrary URLs, which can be used for phishing or drive‑by attacks. This weakness allows an attacker to influence user navigation without needing to compromise the system, impacting user trust and potentially leading to credential theft.
Affected Systems
The affected product is lcg0124 BootDo, a web application built on the BootDo framework. Any deployment up to the code commit 5ccd963c74058036b466e038cff37de4056c1600 is vulnerable. No specific version numbers are listed due to the product’s rolling‑release model.
Risk and Exploitability
The CVSS base score of 5.1 places the problem in the medium severity range, and the EPSS score of less than 1% suggests that the likelihood of exploitation is low in the current environment. The vulnerability is not yet listed in CISA’s KEV catalog. An attacker can trigger the exploit remotely by sending a crafted HTTP request with a malicious Host header that causes the application to redirect the victim to an attacker‑controlled site. Because the application appears to rely on the Host header without proper validation, successful exploitation would depend only on network connectivity to the target and the victim’s willingness to click the redirected link.
OpenCVE Enrichment