Zurück zur Übersicht

Beckhoff: Open redirect in TwinCAT/BSD package authelia-bhf

VDE-2023-067
Last update
22.05.2025 15:03
Published at
13.12.2023 09:00
Vendor(s)
Beckhoff Automation GmbH & Co. KG
External ID
VDE-2023-067
CSAF Document

Summary

With TwinCAT/BSD based products the HTTPS request to the Authelia login page accepts user-controlled input that specifies a link to an external site.

Impact

By default TwinCAT/BSD based products have Authelia installed and configured to perform the user authentication for web applications hosted on a target. This installation and configuration is provided with the package named 'authelia-bhf'. With the affected versions of the package Authelia is configured to accept user-controlled input via URL parameter that specifies a link which can then be a link to an arbitrary external site.

Please note: The sources for the package 'authelia-bhf' are a fork from the original Open Source Software called 'Authelia'. The vulnerability was exclusively introduced with that fork and has been removed there. It never became part of 'Authelia'.

Affected Product(s)

Model no. Product name Affected versions
authelia-bhf included in TwinCAT/BSD Firmware <4.37.5

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
URL Redirection to Untrusted Site ('Open Redirect') (CWE-601)
References

Mitigation

Use firewall or web-proxy technology at your network perimeter which allow internal clients to access only trusted external sites directly.

Remediation

Please update to a recent version of the affected product.

Revision History

Version Date Summary
1 13.12.2023 09:00 initial revision
2 22.05.2025 15:03 Fix: added distribution, quotation mark