Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions or the (3) came_from parameter to /login_form.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2016/Oct/80 | mailing list third party advisory vdb entry |
http://www.openwall.com/lists/oss-security/2016/09/05/4 | patch mailing list third party advisory |
https://plone.org/security/hotfix/20160830/open-redirection-in-plone | vendor advisory |
http://www.openwall.com/lists/oss-security/2016/09/05/5 | patch mailing list third party advisory |
http://www.securityfocus.com/archive/1/539572/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/92752 | vdb entry |