Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://github.com/b2evolution/b2evolution/issues/102 | third party advisory |
http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/49554 | exploit vdb entry third party advisory |