Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
References
Link | Resource |
---|---|
https://github.com/web2py/web2py/commit/e31a099cb3456fef471886339653430ae59056b0 | Patch Third Party Advisory |
https://github.com/web2py/web2py/issues/731 | Third Party Advisory |
https://github.com/web2py/web2py/commit/e31a099cb3456fef471886339653430ae59056b0 | Patch Third Party Advisory |
https://github.com/web2py/web2py/issues/731 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/web2py/web2py/commit/e31a099cb3456fef471886339653430ae59056b0 - Patch, Third Party Advisory | |
References | () https://github.com/web2py/web2py/issues/731 - Third Party Advisory |
Information
Published : 2017-10-18 20:29
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6961
Mitre link : CVE-2015-6961
CVE.ORG link : CVE-2015-6961
JSON object : View
Products Affected
web2py
- web2py
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')