Open redirect vulnerability in the Console in Puppet Enterprise 2015.x and 2016.x before 2016.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the redirect parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6501.
References
Link | Resource |
---|---|
https://puppet.com/security/cve/cve-2016-5715 | Vendor Advisory |
http://www.securityfocus.com/bid/93846 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html | Exploit Third Party Advisory VDB Entry |
http://hyp3rlinx.altervista.org/advisories/PUPPET-AUTHENTICATION-REDIRECT.txt | Exploit Third Party Advisory |
http://www.securityfocus.com/archive/1/539618/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-01-12 15:59
Updated : 2022-01-24 08:46
NVD link : CVE-2016-5715
Mitre link : CVE-2016-5715
JSON object : View
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Products Affected
puppet
- puppet_enterprise