Vulnerabilities (CVE)

Filtered by CWE-601
Total 967 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-25737 1 Kubernetes 1 Kubernetes 2024-02-04 4.9 MEDIUM 4.8 MEDIUM
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
CVE-2021-38343 1 Kylephillips 1 Nested Pages 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to an Open Redirect via the `page` POST parameter in the `npBulkActions`, `npBulkEdit`, `npListingSort`, and `npCategoryFilter` `admin_post` actions.
CVE-2021-34807 1 Zimbra 1 Collaboration 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL via isredirect=1&redirectURL= in conjunction with the token data (e.g., a valid authtoken= value).
CVE-2021-37352 1 Nagios 1 Nagios Xi 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link.
CVE-2020-24550 1 Episerver 1 Find 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL.
CVE-2021-24165 1 Ninjaforms 1 Ninja Forms 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place.
CVE-2021-28125 1 Apache 1 Superset 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
CVE-2021-23384 1 Koa-remove-trailing-slashes Project 1 Koa-remove-trailing-slashes 2024-02-04 5.8 MEDIUM 5.4 MEDIUM
The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::removeTrailingSlashes(), as the web server uses relative URLs instead of absolute URLs.
CVE-2021-39112 1 Atlassian 4 Data Center, Jira, Jira Data Center and 1 more 2024-02-04 4.9 MEDIUM 4.8 MEDIUM
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1.
CVE-2021-29651 1 Pomerium 1 Pomerium 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).
CVE-2021-33707 1 Sap 1 Netweaver Knowledge Management 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
SAP NetWeaver Knowledge Management allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via a URL stored in a component. This could enable the attacker to compromise the user's confidentiality and integrity.
CVE-2021-22098 1 Cloudfoundry 2 Cf-deployment, User Account And Authentication 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims’ accounts in certain cases along with redirection of UAA users to a malicious sites.
CVE-2021-39501 1 Eyoucms 1 Eyoucms 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
EyouCMS 1.5.4 is vulnerable to Open Redirect. An attacker can redirect a user to a malicious url via the Logout function.
CVE-2021-31252 1 Chiyu-tech 28 Bf-430, Bf-430 Firmware, Bf-431 and 25 more 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it.
CVE-2021-23393 1 Flask Unchained Project 1 Flask Unchained 2024-02-04 5.8 MEDIUM 5.4 MEDIUM
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
CVE-2021-32806 1 Plone 1 Isurlinportal 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Products.isurlinportal prior to 1.2.0 have an Open Redirect vulnerability. Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. The url `https:example.org` without slashes is considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect victims to their site, especially as part of a phishing attack. The problem has been patched in Products.isurlinportal 1.2.0.
CVE-2021-35966 1 Learningdigital 1 Orca Hcm 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
The specific function of the Orca HCM digital learning platform does not filter input parameters properly, which causing the URL can be redirected to any website. Remote attackers can use the vulnerability to execute phishing attacks.
CVE-2021-25655 1 Avaya 1 Aura Experience Portal 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix).
CVE-2020-21998 1 Homeautomation Project 1 Homeautomation 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.
CVE-2021-1358 1 Cisco 1 Finesse 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to redirect a user to an undesired web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.