Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8 - Third Party Advisory | |
References | () http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93 - Patch, Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3200 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/03/26/4 - Mailing List, Patch, VDB Entry | |
References | () http://www.securityfocus.com/bid/73219 - Third Party Advisory, VDB Entry | |
References | () https://www.drupal.org/SA-CORE-2015-001 - Patch, Vendor Advisory |
Information
Published : 2017-09-13 16:29
Updated : 2024-11-21 02:27
NVD link : CVE-2015-2750
Mitre link : CVE-2015-2750
CVE.ORG link : CVE-2015-2750
JSON object : View
Products Affected
debian
- debian_linux
drupal
- drupal
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')