Wordpress plugin Furikake version 0.1.0 is vulnerable to an Open Redirect The furikake-redirect parameter on a page allows for a redirect to an attacker controlled page classes/Furigana.php: header('location:'.urldecode($_GET['furikake-redirect']));
References
Link | Resource |
---|---|
https://cjc.im/advisories/0008/ | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/8992 | Third Party Advisory |
https://cjc.im/advisories/0008/ | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/8992 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://cjc.im/advisories/0008/ - Exploit, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8992 - Third Party Advisory |
Information
Published : 2018-01-02 23:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000434
Mitre link : CVE-2017-1000434
CVE.ORG link : CVE-2017-1000434
JSON object : View
Products Affected
furikake_project
- furikake
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')