CVE-2012-5234

Open redirect vulnerability in index.php in ocPortal before 7.1.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ocportal:ocportal:*:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.0:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2:beta1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2:beta2:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2:rc1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2:rc2:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2:rc3:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.3:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.3:rc1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.3:rc2:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.3:rc3:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.0:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.0.2:beta1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:5.1:beta1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:6.2:rc1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.0:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.1:beta1:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ocportal:ocportal:7.1.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm - Vendor Advisory () http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm - Vendor Advisory
References () http://ocportal.com/site/news/view/ocportal-security-update.htm - Patch, Vendor Advisory () http://ocportal.com/site/news/view/ocportal-security-update.htm - Patch, Vendor Advisory

Information

Published : 2012-10-01 23:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5234

Mitre link : CVE-2012-5234

CVE.ORG link : CVE-2012-5234


JSON object : View

Products Affected

ocportal

  • ocportal
CWE
CWE-20

Improper Input Validation