Open redirect vulnerability in the password reset functionality in POSH 3.0 through 3.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to portal/scr_sendmd5.php.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
http://seclists.org/oss-sec/2014/q1/444 | third party advisory mailing list |
http://www.securityfocus.com/bid/65843 | third party advisory vdb entry |
https://sysdream.com/news/lab/posh-3-2-1-multiple-vulnerabilities/ | third party advisory exploit |