Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.
References
Link | Resource |
---|---|
https://avideo.tube/ | Product |
https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c | Patch Third Party Advisory |
https://avideo.tube/ | Product |
https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://avideo.tube/ - Product | |
References | () https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c - Patch, Third Party Advisory |
Information
Published : 2022-04-05 16:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27463
Mitre link : CVE-2022-27463
CVE.ORG link : CVE-2022-27463
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')