Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8rwp-72pf-cq9g

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Revive Adserver before 5.1.0 is vulnerable to open redirects via the dest, oadest, and/or ct0 parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.

Revive Adserver before 5.1.0 is vulnerable to open redirects via the dest, oadest, and/or ct0 parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.

EPSS

Процентиль: 99%
0.75772
Высокий

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 6.1
nvd
около 5 лет назад

Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.

EPSS

Процентиль: 99%
0.75772
Высокий

Дефекты

CWE-601