Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence.
References
Link | Resource |
---|---|
https://www.drupal.org/SA-CORE-2015-001 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/73219 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/03/26/4 | Mailing List Patch VDB Entry |
http://www.debian.org/security/2015/dsa-3200 | Third Party Advisory |
http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93 | Patch Third Party Advisory |
http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-09-13 09:29
Updated : 2017-09-20 12:15
NVD link : CVE-2015-2750
Mitre link : CVE-2015-2750
JSON object : View
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Products Affected
debian
- debian_linux
drupal
- drupal