Open redirect vulnerability in SHIRASAGI v1.7.0 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://www.ss-proj.org/ | release notes vendor advisory |
https://github.com/shirasagi/shirasagi | third party advisory |
https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3 | third party advisory patch |
https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch | third party advisory patch |
http://jvn.jp/en/jp/JVN74699196/index.html | third party advisory |