Open redirect vulnerability in the Console in Puppet Enterprise 2015.x and 2016.x before 2016.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the redirect parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6501.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html | exploit vdb entry third party advisory |
https://puppet.com/security/cve/cve-2016-5715 | vendor advisory |
http://www.securityfocus.com/archive/1/539618/100/0/threaded | mailing list |
http://hyp3rlinx.altervista.org/advisories/PUPPET-AUTHENTICATION-REDIRECT.txt | third party advisory exploit |
http://www.securityfocus.com/bid/93846 | vdb entry third party advisory |