Open redirect vulnerability in the securelogin_secure_redirect function in the Secure Login module 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the q parameter.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/10/04/6 | mailing list |
http://drupalcode.org/project/securelogin.git/commitdiff/88518df | patch exploit |
https://drupal.org/node/1698988 | patch |
https://drupal.org/node/1692976 | patch vendor advisory |
http://www.securityfocus.com/bid/54675 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/10/07/1 | mailing list |
http://drupal.org/node/1700594 | patch vendor advisory |