Open redirect vulnerability in the password reset functionality in POSH 3.0 through 3.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to portal/scr_sendmd5.php.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/oss-sec/2014/q1/444 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/65843 | Third Party Advisory VDB Entry | 
| https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ | Exploit Third Party Advisory | 
| http://seclists.org/oss-sec/2014/q1/444 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/65843 | Third Party Advisory VDB Entry | 
| https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:05
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/oss-sec/2014/q1/444 - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/65843 - Third Party Advisory, VDB Entry | |
| References | () https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ - Exploit, Third Party Advisory | 
Information
                Published : 2019-11-22 19:15
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2213
Mitre link : CVE-2014-2213
CVE.ORG link : CVE-2014-2213
JSON object : View
Products Affected
                posh_project
- posh
CWE
                
                    
                        
                        CWE-601
                        
            URL Redirection to Untrusted Site ('Open Redirect')
