Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-0715

Опубликовано: 26 фев. 2010
Источник: nvd
CVSS2: 6.8
EPSS Низкий

Описание

Open redirect vulnerability in login.jsp in IBM WebSphere Portal, IBM Lotus Web Content Management (WCM), and IBM Lotus Workplace Web Content Management 5.1.0.0 through 5.1.0.5, 6.0.0.0 through 6.0.0.4, 6.0.1.0 through 6.0.1.7, 6.1.0.0 through 6.1.0.3, and 6.1.5.0; and IBM Lotus Quickr services 8.0, 8.0.0.2, 8.1, 8.1.1, and 8.1.1.1 for WebSphere Portal; allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the query string.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ibm:websphere_portal:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:5.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:5.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:5.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:5.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:5.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:ibm:lotus_web_content_management:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:5.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:5.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:5.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:5.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:5.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_web_content_management:6.1.5.0:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:ibm:lotus_workplace_web_content_management:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:5.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:5.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:5.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:5.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:5.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_workplace_web_content_management:6.1.5.0:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:ibm:lotus_quickr:8.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_quickr:8.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_quickr:8.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_quickr:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_quickr:8.1.1.1:*:*:*:*:*:*:*

EPSS

Процентиль: 69%
0.00609
Низкий

6.8 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

github
почти 4 года назад

Open redirect vulnerability in login.jsp in IBM WebSphere Portal, IBM Lotus Web Content Management (WCM), and IBM Lotus Workplace Web Content Management 5.1.0.0 through 5.1.0.5, 6.0.0.0 through 6.0.0.4, 6.0.1.0 through 6.0.1.7, 6.1.0.0 through 6.1.0.3, and 6.1.5.0; and IBM Lotus Quickr services 8.0, 8.0.0.2, 8.1, 8.1.1, and 8.1.1.1 for WebSphere Portal; allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the query string.

EPSS

Процентиль: 69%
0.00609
Низкий

6.8 Medium

CVSS2

Дефекты

NVD-CWE-Other