Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3200 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2015/03/26/4 | patch mailing list vdb entry |
http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93 | third party advisory patch |
http://www.securityfocus.com/bid/73219 | third party advisory vdb entry |
http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8 | third party advisory |
https://www.drupal.org/SA-CORE-2015-001 | patch vendor advisory |