Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-6961

Опубликовано: 18 окт. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8
CVSS3: 6.1

Описание

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.

РелизСтатусПримечание
artful

not-affected

2.12.3-1
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-apps/xenial

not-affected

2.12.3-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needed

Показывать по

EPSS

Процентиль: 46%
0.0023
Низкий

5.8 Medium

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 8 лет назад

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.

CVSS3: 6.1
debian
больше 8 лет назад

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows ...

CVSS3: 6.1
github
больше 3 лет назад

Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.

EPSS

Процентиль: 46%
0.0023
Низкий

5.8 Medium

CVSS2

6.1 Medium

CVSS3