Open redirect vulnerability in the password reset functionality in POSH 3.0 through 3.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to portal/scr_sendmd5.php.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2014/q1/444 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/65843 | Third Party Advisory VDB Entry |
https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ | Exploit Third Party Advisory |
http://seclists.org/oss-sec/2014/q1/444 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/65843 | Third Party Advisory VDB Entry |
https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2014/q1/444 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/65843 - Third Party Advisory, VDB Entry | |
References | () https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ - Exploit, Third Party Advisory |
Information
Published : 2019-11-22 19:15
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2213
Mitre link : CVE-2014-2213
CVE.ORG link : CVE-2014-2213
JSON object : View
Products Affected
posh_project
- posh
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')