Show plain JSON{"id": "CVE-2014-1985", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-04-11T14:55:05.663", "references": [{"url": "http://jvn.jp/en/jp/JVN93004610/index.html", "source": "vultures@jpcert.or.jp"}, {"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000041.html", "source": "vultures@jpcert.or.jp"}, {"url": "http://seclists.org/oss-sec/2014/q2/84", "source": "vultures@jpcert.or.jp"}, {"url": "http://secunia.com/advisories/57524", "tags": ["Vendor Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "http://www.redmine.org/projects/redmine/wiki/Changelog", "source": "vultures@jpcert.or.jp"}, {"url": "http://www.redmine.org/projects/redmine/wiki/Changelog_2_4", "source": "vultures@jpcert.or.jp"}, {"url": "http://www.redmine.org/projects/redmine/wiki/Security_Advisories", "tags": ["Exploit", "Patch"], "source": "vultures@jpcert.or.jp"}, {"url": "http://www.securityfocus.com/bid/66674", "source": "vultures@jpcert.or.jp"}, {"url": "https://github.com/redmine/redmine/commit/7567c3d8b21fe67e5f04e6839c1fce061600f2f3", "source": "vultures@jpcert.or.jp"}, {"url": "http://jvn.jp/en/jp/JVN93004610/index.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000041.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/oss-sec/2014/q2/84", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/57524", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redmine.org/projects/redmine/wiki/Changelog", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redmine.org/projects/redmine/wiki/Changelog_2_4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redmine.org/projects/redmine/wiki/Security_Advisories", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/66674", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/redmine/redmine/commit/7567c3d8b21fe67e5f04e6839c1fce061600f2f3", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "Open redirect vulnerability in the redirect_back_or_default function in app/controllers/application_controller.rb in Redmine before 2.4.5 and 2.5.x before 2.5.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the back url (back_url parameter)."}, {"lang": "es", "value": "Vulnerabilidad de redirecci\u00f3n abierta en la funci\u00f3n redirect_back_or_default en app/controllers/application_controller.rb en Redmine anterior a 2.4.5 y 2.5.x anterior a 2.5.1 permite a atacantes remotos redirigir usuarios hacia sitios web arbitrarios y realizar ataques de phishing a trav\u00e9s de una URL en la url back (par\u00e1metro back_url)."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14A4B298-BCC4-4E4C-A538-28CD0E11F1A4", "versionEndIncluding": "2.4.4"}, {"criteria": "cpe:2.3:a:redmine:redmine:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86858F9B-8A3B-4667-A42B-198862F0508E"}, {"criteria": "cpe:2.3:a:redmine:redmine:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64B5E6E0-4824-46AE-9518-A9E17FB74E84"}, {"criteria": "cpe:2.3:a:redmine:redmine:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E13CFD7-1981-49C4-9990-713C811DC851"}, {"criteria": "cpe:2.3:a:redmine:redmine:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A120F2B-AF7F-416E-929B-C2BF573F5032"}, {"criteria": "cpe:2.3:a:redmine:redmine:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F96EDC1C-A925-4D24-87B4-BA3AA993ABAF"}], "operator": "OR"}]}], "sourceIdentifier": "vultures@jpcert.or.jp"}