Open redirect vulnerability in zport/acl_users/cookieAuthHelper/login_form in Zenoss 4.2.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the came_from parameter.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/67396 | vdb entry |
http://www.openwall.com/lists/oss-security/2014/05/15/5 | mailing list |
https://www.youtube.com/watch?v=wtmdsz24evo | exploit |
http://www.openwall.com/lists/oss-security/2014/05/14/5 | mailing list |