Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://www.ss-proj.org/ | vendor advisory |
https://github.com/shirasagi/shirasagi | third party advisory |
https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a | third party advisory patch |
https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a.patch | mailing list third party advisory patch |
https://jvn.jp/en/jp/JVN55657988/index.html | third party advisory |