An issue was discovered in Open-AudIT Professional 2.1. It is possible to inject a malicious payload in the redirect_url parameter to the /login URI to trigger an open redirect. A "data:text/html;base64," payload can be used with JavaScript code.
References
Link | Resource |
---|---|
https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html | Exploit Third Party Advisory |
https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html - Exploit, Third Party Advisory |
Information
Published : 2018-03-26 17:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-8937
Mitre link : CVE-2018-8937
CVE.ORG link : CVE-2018-8937
JSON object : View
Products Affected
open-audit
- open-audit
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')