Open redirect vulnerability in wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the backto parameter.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.debian.org/security/2009/dsa-1871 | vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2008-12/0226.html | mailing list exploit |
http://osvdb.org/52213 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50382 | vdb entry |