Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-6961

Опубликовано: 18 окт. 2017
Источник: debian

Описание

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
web2pyfixed2.12.3-1package
web2pyignoredjessiepackage
web2pyno-dsawheezypackage

Примечания

  • Fixed by: https://github.com/web2py/web2py/commit/e31a099cb3456fef471886339653430ae59056b0 (R-2.12.1)

  • https://github.com/web2py/web2py/issues/731

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 8 лет назад

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.

CVSS3: 6.1
nvd
больше 8 лет назад

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.

CVSS3: 6.1
github
больше 3 лет назад

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.