CVE-2015-1051

Open redirect vulnerability in the Context UI module in the Context module 7.x-3.x before 7.x-3.6 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the destination parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:context_project:context:7.x-3.0:*:*:*:*:drupal:*:*
cpe:2.3:a:context_project:context:7.x-3.1:*:*:*:*:drupal:*:*
cpe:2.3:a:context_project:context:7.x-3.2:*:*:*:*:drupal:*:*
cpe:2.3:a:context_project:context:7.x-3.3:*:*:*:*:drupal:*:*
cpe:2.3:a:context_project:context:7.x-3.4:*:*:*:*:drupal:*:*
cpe:2.3:a:context_project:context:7.x-3.5:*:*:*:*:drupal:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148782.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148782.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148800.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148800.html - Third Party Advisory
References () http://www.securityfocus.com/bid/71925 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/71925 - Third Party Advisory, VDB Entry
References () https://www.drupal.org/node/2402779 - Patch () https://www.drupal.org/node/2402779 - Patch
References () https://www.drupal.org/node/2403351 - Patch, Vendor Advisory () https://www.drupal.org/node/2403351 - Patch, Vendor Advisory

Information

Published : 2015-01-15 15:59

Updated : 2024-11-21 02:24


NVD link : CVE-2015-1051

Mitre link : CVE-2015-1051

CVE.ORG link : CVE-2015-1051


JSON object : View

Products Affected

fedoraproject

  • fedora

context_project

  • context