Open redirect vulnerability in the search script in Trac before 0.10.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the q parameter, possibly related to the quickjump function.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://holisticinfosec.org/content/view/72/45/ - Broken Link | |
References | () http://secunia.com/advisories/31314 - Broken Link, Vendor Advisory | |
References | () http://trac.edgewall.org/wiki/ChangeLog - Release Notes | |
References | () http://www.osvdb.org/46513 - Broken Link | |
References | () http://www.securityfocus.com/bid/30402 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44043 - Third Party Advisory, VDB Entry | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html - Mailing List | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html - Mailing List |
09 Feb 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fedoraproject
Edgewall Fedoraproject fedora Edgewall trac |
|
CWE | CWE-601 | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/44043 - Third Party Advisory, VDB Entry | |
References | (OSVDB) http://www.osvdb.org/46513 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/30402 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/31314 - Broken Link, Vendor Advisory | |
References | (MISC) http://holisticinfosec.org/content/view/72/45/ - Broken Link | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html - Mailing List | |
References | (CONFIRM) http://trac.edgewall.org/wiki/ChangeLog - Release Notes | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html - Mailing List | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.1 |
CPE | cpe:2.3:a:trac:trac:0.10.3.1:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.10:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.6:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9:b1:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.10.2:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.5:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.6.1:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9.1:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.8:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.5.2:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.9:b2:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.10.3:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.7.1:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.8.3:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.5.1:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:*:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.8.4:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.7:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.10.1:*:*:*:*:*:*:* cpe:2.3:a:trac:trac:0.8.1:*:*:*:*:*:*:* |
cpe:2.3:a:edgewall:trac:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:* |
Information
Published : 2008-07-27 22:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-2951
Mitre link : CVE-2008-2951
CVE.ORG link : CVE-2008-2951
JSON object : View
Products Affected
edgewall
- trac
fedoraproject
- fedora
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')