Impress CMS 'user.php' URL Redirection Vulnerability
BID:69637
Info
Impress CMS 'user.php' URL Redirection Vulnerability
| Bugtraq ID: | 69637 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 04 2014 12:00AM |
| Updated: | Sep 04 2014 12:00AM |
| Credit: | JoeV |
| Vulnerable: | |
| Not Vulnerable: | |
Discussion
Impress CMS 'user.php' URL Redirection Vulnerability
Impress CMS is prone to a remote URL-redirection vulnerability.
An attacker can leverage this issue by constructing a URI that includes a malicious site redirection. When an unsuspecting victim follows the URI, they may be redirected to an attacker-controlled site; this may aid in phishing attacks.
Impress CMS 1.3.7 is vulnerable; other versions may also be affected.
Impress CMS is prone to a remote URL-redirection vulnerability.
An attacker can leverage this issue by constructing a URI that includes a malicious site redirection. When an unsuspecting victim follows the URI, they may be redirected to an attacker-controlled site; this may aid in phishing attacks.
Impress CMS 1.3.7 is vulnerable; other versions may also be affected.
Exploit / POC
Impress CMS 'user.php' URL Redirection Vulnerability
An attacker can exploit this issue by enticing an unsuspecting victim into following a malicious URI.
The following example URI is available:
http://localhost/user.php?xoops_redirect="malicious link or port number"
An attacker can exploit this issue by enticing an unsuspecting victim into following a malicious URI.
The following example URI is available:
http://localhost/user.php?xoops_redirect="malicious link or port number"
Solution / Fix
Impress CMS 'user.php' URL Redirection Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].